Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

What is hacking?

Computer hackers are unauthorized users who break into computer systems in order to steal,
change or destroy information, often by installing dangerous malware without your knowledge
or consent. Their clever tactics and detailed technical knowledge help them access the
information you really don’t want them to have.

One of the most high-profiled hacker in the history is Kevin David Mitnick. He is an American
computer security consultant, author, and convicted hacker. He is best known for his high-profile
1995 arrest and five years in prison for various computer and communications-related crimes.

How can hackers find me?

Anyone who uses a computer connected to the Internet is susceptible to the threats that computer
hackers and online predators pose. These online villains typically use phishing scams, spam
email or instant messages and bogus websites to deliver dangerous malware to your computer
and compromise your computer security.

Computer hackers can also try to access your computer and private information directly if you
are not protected by a firewall. They can monitor your conversations or peruse the back-end of
your personal website. Usually disguised with a bogus identity, predators can lure you into
revealing sensitive personal and financial information, or much worse.

Types of Hackers
Hackers are classified according to the intent of their actions. The following list classifies
hackers according their intent.

Cracker (Black hat): A hacker who gains unauthorized access to computer


systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.

Their primary motivation is usually for personal or financial gain, but they can also be involved
in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime. Black hat
hackers can range from amateurs getting their feet wet by spreading malware, to experienced
hackers that aim to steal data, specifically financial information, personal information and login
credentials. Not only do black hat hackers seek to steal data, they also seek to modify or destroy
data as well.

Example of a notorious black hat hacker are Matthew Bevan and Richard Pryce, who is a team of
British hackers who hacked into multiple military networks in 1996, including Griffiss Air Force
Base, the Defense Information System Agency and the Korean Atomic Research Institute
(KARI). Bevan (Kuji) and Pryce (Datastream Cowboy) have been accused of nearly starting a
third world war after they dumped KARI research onto American military systems. Bevan claims
he was looking to prove a UFO conspiracy theory, and according to the BBC, his case bears
resemblance to that of Gary McKinnon. Malicious intent or not, Bevan and Pryce demonstrated
that even military networks are vulnerable.

Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the
identified weaknesses. They may also perform penetration Testing and vulnerability assessments.

A white hat hacker — also referred to as a “good hacker” or an “ethical hacker” — is someone
who exploits computer systems or networks to identify security flaws and make improvement
recommendations. Unlike black hat hackers, who access systems illegally, with malicious intent
and often for personal gain, white hat hackers work with companies to help identify weaknesses
in their systems and make corresponding updates.In many ways, white hat hackers are the
antithesis of black hat hackers. Not only do white hat hackers break into systems with the
intention of improving vulnerabilities, they do so to ensure that black hat hackers aren’t able to
illegally access the system’s data.

Tim Berners-Lee is one of the most famous names in computer science, Berners-Lee is the
founder of the World Wide Web. Today he serves as the director of the World Wide Web
Consortium (W3C), which oversees the development of the web.

Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into
computer systems without authority with a view to identify weaknesses and reveal them to the
system owner.

Often, grey hat hackers will look for vulnerabilities in a system without the owner’s permission
or knowledge. If issues are found, they will report them to the owner, sometimes requesting a
small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers
will post the newly found exploit online for the world to see.
These types of hackers are not inherently malicious with their intentions; they’re just looking to
get something out of their discoveries for themselves. Usually, grey hat hackers will not exploit
the found vulnerabilities. However, this type of hacking is still considered illegal because the
hacker did not receive permission from the owner prior to attempting to attack the system.

Script kiddies: A non-skilled person who gains access to computer systems using already made
tools.
The availability of free and open source software poses a significant risk for websites and
networks. Programs originally intended for computer security and forensics could be used to
unleash a distributed denial of service (DDoS) attack on a website or network. This could cause
hundreds or even thousands of dollars in lost revenue or damage. A script kiddie can easily find
vulnerabilities to access private systems using programs developed for pen-testing. If an attacker
has the skill, they can either steal data or plant malware.
For example, imagine a child gets their first computer. The child watches a movie about hacking
and then downloads a copy of Kali Linux. They begin playing with the various programs while
searching for online tutorials. At first, they may be perceived as nothing more than an internet
troll or noob, due to their lack of experience and quickness to brag and boast. Sometimes they
will even resort to cyberstalking or bullying. However , this may simply be a cover for other
more nefarious activity.

Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This
is usually done by hijacking websites and leaving the message on the hijacked website.

Hacktivism started as a way for people to protest online to affect change. A hacktivist is
motivated by civil disobedience and seeks to spread an ideology. In some cases, this ideology
includes total anarchy. Still, hacktivists are typically not motivated by malicious
intent. Hacktivists also steal money or data in an effort to spread their agenda. However, their
motivation is more like that of Robin Hood. They seek to take from those who have and give
freely to those who have not. They typically see themselves as vigilantes who use hacking to
enact social justice and policy changes.

One of the largest hacktivist groups in the world today, Anonymous is a far reaching
organization of hackers around the globe. 

Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.

Phreaking involved reverse engineering the specific tones used by phone companies to route
long distance calls. By emulating those tones, “phreaks” could make free calls around the world.
Phreaking largely ended in 1983 when telephone lines were upgraded to common channel
interoffice signaling (CCIS), which separated signaling from the voice line.

Phone phreaking first began in the 1960s when people discovered that various whistles could re-
create the 2,600 MHz pitch of the phone routing signal. Some people could whistle in a perfect
2,600 MHz pitch, most notably a blind man, Joe Engressia (also known as Joybubbles), who
became known as the whistling phreaker.

What are things that a hacker can do to me?

While your computer is connected to the Internet, the malware a hacker has installed on your PC
quietly transmits your personal and financial information without your knowledge or consent.
Or, a computer predator may pounce on the private information you unwittingly revealed. In
either case, they will be able to:

⚫ Hijack your usernames and passwords


⚫ Steal your money and open credit card and bank accounts in your name
⚫ Ruin your credit
⚫ Request new account Personal Identification Numbers (PINs) or additional credit cards
⚫ Make purchases
⚫ Add themselves or an alias that they control as an authorized user so it’s easier to use your
credit
⚫ Obtain cash advances
⚫ Use and abuse your Social Security number
⚫ Sell your information to other parties who will use it for illicit or illegal purposes

Predators who stalk people while online can pose a serious physical threat. Using extreme
caution when agreeing to meet an online “friend” or acquaintance in person is always the best
way to keep safe.

How will I know if I've been hacked?

Check the accuracy of your personal accounts, credit cards, and documents. Are there
unexplained transactions? Questionable or unauthorized changes? If so, dangerous malware
installed by predators or hackers may already be lurking

An unprotected computer is like an open door for computer hackers and predators. To take it a
step further, protect your computer from hackers by using a spam filter or gateway to scan
inbound email or instant messages. Products like Webroot AntiVirus and Webroot Internet
Security Complete thwart dangerous malware before it can enter your PC, stand guard at every
possible entrance of your computer and fend off any spyware or viruses that try to enter, even the
most damaging and devious strains. While free anti-spyware and antivirus downloads are
available, they just can’t keep up with the continuous onslaught of new malware strains.
Previously undetected forms of malware can often do the most damage, so it’s critical to have
up-to-the-minute, guaranteed protection.

Computers have taken over our lives. People could not function without them, our
electricity is run by computers, the government could not function without computers, and
there are many others. Hackers are people who illegally gain access to, and sometimes
tamper with, information in a computer system. Due to recent media coverage and
corporate interest, hacker's activities are now looked down on by society as criminals.
Despite the growing trend of hacking, very little research has been done on the hacking
world and its culture. The image of a computer hacker has grown from a harmless nerd
into a vicious techno-criminal. In reality most hackers are not out to destroy the world. The
hackers in today's society are not just board teenagers. Since the introduction of personal
computers in the 1970's, the art of computer hacking has grown along with the changing
roles of computers in society.

You might also like