Saturday, July 4, 2020
Home Ethical Hacking What is Hacking? Introduction & Types

What is Hacking? Introduction & Types


What is Hacking? Introduction & Types

What is hacking
Hacking

Hacking is identifying weakness in computer systems or networks to take advantage of its weaknesses to realize access. Example of Hacking: Using password cracking algorithm to realize access to a system

Computers became mandatory to run a successful businesses. it’s not enough to possess isolated computers systems; they have to be networked to facilitate communication with external businesses. This exposes them to the surface world and hacking. Hacking means using computers to commit fraudulent acts like fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations many dollars per annum . Businesses got to protect themselves against such attacks.

In this tutorial, we’ll learn-

Common Hacking Terminologies
What is Cyber Crime?
Types of Cyber Crime
What is Ethical Hacking?
Why Ethical Hacking?
Legality of Ethical Hacking
Summary
Before we go any longer , let’s check out a number of the foremost commonly used terminologies within the world of hacking.

Who may be a Hacker? sorts of Hackers
A Hacker may be a one that finds and exploits the weakness in computer systems and/or networks to realize access. Hackers are usually skilled computer programmers with knowledge of computer security.

Hackers are classified consistent with the intent of their actions. the subsequent list classifies hackers consistent with their intent.

Symbol Description
What is Hacking ? An Introduction Ethical Hacker (White hat): A hacker who gains access to systems with a view to repair the identified weaknesses. they’ll also perform penetration Testing and vulnerability assessments.
What is Hacking ? An Introduction Cracker (Black hat): A hacker who gains unauthorized access to computer systems for private gain. The intent is typically to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
What is Hacking ? An Introduction Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to spot weaknesses and reveal them to the system owner.
What is Hacking ? An Introduction Script kiddies: A non-skilled one that gains access to computer systems using already made tools.
What is Hacking ? An Introduction Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. this is often usually done by hijacking websites and leaving the message on the hijacked website.
What is Hacking ? An Introduction Phreaker: A hacker who identifies and exploits weaknesses in telephones rather than computers.

Symbol Description
What is Hacking ? An Introduction Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments.
What is Hacking ? An Introduction Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
What is Hacking ? An Introduction Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
What is Hacking ? An Introduction Script kiddies: A non-skilled person who gains access to computer systems using already made tools.
What is Hacking ? An Introduction Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
What is Hacking ? An Introduction Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.

What is Cybercrime?
Cyber crime is that the use of computers and networks to perform illegal activities like spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrimes are committed through the web . Some cybercrimes also can be administered using Mobile phones via SMS and online chatting applications.

Type of Cybercrime
The following list presents the common sorts of cybercrimes:
Computer Fraud: Intentional deception for private gain via the utilization of computer systems.
Privacy violation: Exposing personal information like email addresses, telephone number , account details, etc. on social media, websites, etc.
Identity Theft: Stealing personal information from somebody and impersonating that person.
Sharing copyrighted files/information: This involves distributing copyright protected files like eBooks and computer programs etc.
Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
Electronic money laundering: This involves the utilization of the pc to launder money.
ATM Fraud: This involves intercepting ATM card details like account number and PIN numbers. These details are then wont to withdraw funds from the intercepted accounts.
Denial of Service Attacks: This involves the utilization of computers in multiple locations to attack servers with a view of shutting them down.
Spam: Sending unauthorized emails. These emails usually contain advertisements.

What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the subsequent rules.

Get written permission from the owner of the pc system and/or network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses within the computing system to the organization.
Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
Information is one among the foremost valuable assets of a corporation . Keeping information secure can protect a corporation ’s image and save an organization tons of cash .
Hacking can cause loss of business for organizations that deal in finance like PayPal. Ethical hacking puts them a step before the cyber criminals who would otherwise cause loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the principles stipulated within the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. those that pass the examination are awarded with certificates. The certificates are alleged to be renewed after a while .

Summary
Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
Cybercrime is committing a criminal offense with the help of computers and knowledge technology infrastructure.
Ethical Hacking is about improving the safety of computer systems and/or computer networks.
Ethical Hacking is legal.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Raspberry Pi | Hackers True Love

Raspberry Pi is a very good and useful device for aspiring hackers.who want  a portable and powerfull device for hacking. What is Raspberry Pi ? The...

Social Engineering: How to become a Dark Art Artisan

Social Engineering: How to become a Dark Art Artisan Therefore, his program director forced him to take a course he did not want to do....

7 Excellent Websites for Checking Google Keyword Rankings

7 Excellent Websites for Checking Google Keyword Rankings 7 accurate and modern Google status verification tools: Semrush AccuRanker Ahrefs SERPWatcher Google Rank Checker SERP Keyword Ranking Verifier SEOC within corrective range 1. Semersh Google...

WHAT IS SOCIAL ENGINEERING? ATTACKS, TECHNIQUES & PREVENTION

What is Social Engineering? Attacks, Techniques & Prevention What is social engineering? Social engineering is the art of tampering with the users of a computer system...

Recent Comments