Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Hacking

=the act of identifying and then exploiting weaknesses in a computer system or network,
usually to gain unauthorized access to personal or organizational data.
Hacking is not always a malicious act, but it is most commonly associated with illegal activity
and data theft by cyber criminals.
HISTORY (1st slide)
Hacking first appeared as a term in the 1970s but became more popular through the next
decade. An article in a 1980 edition of Psychology Today ran the headline “The Hacker
Papers” in an exploration of computer usage's addictive nature. Two years later, two movies,
Tron and WarGames, were released, in which the lead characters set about hacking into
computer systems, which introduced the concept of hacking to a wide audience and as a
potential national security risk.
HOW HACKING WORKS? (2nd slide)
Social engineering

= a manipulation technique designed to exploit human error to gain access to personal


information. Using a fake identity and various psychological tricks, hackers can deceive you
into disclosing personal or financial information. They may rely on phishing scams, spam
emails or instant messages, or even fake websites to achieve this.

Hacking passwords

Hackers use different ways to obtain passwords. The trial and error method is known as
a brute force attack, which involves hackers trying to guess every possible combination to
gain access. Hackers may also use simple algorithms to generate different combinations for
letters, numbers, and symbols to help them identify password combinations. Another
technique is known as a dictionary attack, which is a program that inserts common words into
password fields to see if one works.

Infecting devices with malware (Malware, or malicious software, is any program or file that
is intentionally harmful to a computer, network or server.)

Hackers may infiltrate a user’s device to install malware. More likely, they will target
potential victims via email, instant messages and websites with downloadable content or peer-
to-peer networks.

TYPES OF HACKING:
There are typically four key drivers that lead to hacking websites or systems: (1) financial
gain through the theft of credit card details, (2) corporate espionage, (3) to gain
notoriety or respect for their hacking talents, and (4) state-sponsored hacking that aims
to steal business information and national intelligence. On top of that, there are politically
motivated hackers—or hacktivists—who aim to raise public attention by leaking sensitive
information, such as Anonymous, LulzSec, and WikiLeaks.
1. BLACK HAT HACKERS
= „The bad guys“
They go out of their way to discover vulnerabilities in computer systems and software
to exploit them for financial gain or for more malicious purposes, such as to gain
reputation, carry out corporate espionage, or as part of a nation-state hacking
campaign.
These individuals’ actions can inflict serious damage on both computer users and the
organizations they work for. They can steal sensitive personal information,
compromise computer and financial systems, and alter or take down the functionality
of websites and critical networks.
2. WHITE HAT HACKERS
= „The goos guys“
attempt to prevent the success of black hat hackers through proactive hacking. They
use their technical skills to break into systems to assess and test the level of network
security, also known as ethical hacking. This helps expose vulnerabilities in systems
before black hat hackers can detect and exploit them.
The techniques white hat hackers use are similar to or even identical to those of black
hat hackers, but these individuals are hired by organizations to test and discover
potential holes in their security defenses.
3. GREY HAT HACKERS
Grey hat hackers sit somewhere between the good and the bad guys. Unlike black hat
hackers, they attempt to violate standards and principles but without intending to do
harm or gain financially. Their actions are typically carried out for the common good.
For example, they may exploit a vulnerability to raise awareness that it exists, but
unlike white hat hackers, they do so publicly. This alerts malicious actors to the
existence of the vulnerability.
WHAT CAN BE HACKED?
Smart devices (smartphones – Android > Apple)
WebCams (spy on users, read their messages, see their browsing activity, take screenshots,
and hijack their webcam)
Routers (enables an attacker to gain access to data sent and received across them and
networks that are accessed on them)
Email (used to spread malware and ransomware and as a tactic for phishing attacks, which
enable attackers to target victims with malicious attachments or links. )

PREVENTION FROM GETTING HACKED:


Software update:
Hackers are constantly on the lookout for vulnerabilities or holes in security that have not
been seen or patched. Therefore, updating software and operating systems are both crucial to
preventing users and organizations from getting hacked. They must enable automatic updates
and ensure the latest software version is always installed on all of their devices and programs.
Unique passwords for different accounts:
Weak passwords or account credentials and poor password practices are the most common
cause of data breaches and cyberattacks. It is vital to not only use strong passwords that are
difficult for hackers to crack but also to never use the same password for different accounts.
Using unique passwords is crucial to limiting hackers’ effectiveness.
HTTPS encryption
Spoofed websites are another common vehicle for data theft, when hackers create a scam
website that looks legitimate but will actually steal the credentials that users enter. It is
important to look for the Hypertext Transfer Protocol Secure (HTTPS) prefix at the start of a
web address. For example https://www.gymgolnr.sk/

Avoid clicking on ads or strange links

Advertisements like pop-up ads are also widely used by hackers. When clicked, they lead the
user to inadvertently download malware or spyware onto their device. Links should be treated
carefully, and strange links within email messages or on social media, in particular, should
never be clicked. These can be used by hackers to install malware on a device or lead users to
spoofed websites.

Download from first-party sources


Only download applications or software from trusted organizations and first-party sources.
Downloading content from unknown sources means users do not fully know what they are
accessing, and the software can be infected with malware, viruses, or Trojans.

Install antivirus software


Having antivirus software installed on devices is crucial to spotting potential malicious files,
activity, and bad actors. A trusted antivirus tool protects users and organizations from the
latest malware, spyware, and viruses and uses advanced detection engines to block and
prevent new and evolving threats.

Use a VPN
Using a virtual private network (VPN) allows users to browse the internet securely. It hides
their location and prevents hackers from intercepting their data or browsing activity.

Use two-factor authentication


Two-factor authentication (2FA) removes people's reliance on passwords and provides more
certainty that the person accessing an account is who they say they are. When a user logs in to
their account, they are then prompted to provide another piece of identity evidence, such as
their fingerprint or a code sent to their device.
ETHICAL HACKING
Ethical hacking refers to the actions carried out by white hat security hackers. It involves
gaining access to computer systems and networks to test for potential vulnerabilities, and then
fixing any identified weaknesses. Using these technical skills for ethical hacking purposes is
legal, provided the individual has written permission from the system or network owner,
protects the organization’s privacy, and reports all weaknesses they find to

https://www.fortinet.com/resources/cyberglossary/what-is-hacking
https://www.kaspersky.com/resource-center/definitions/what-is-hacking
https://www.techtarget.com/searchsecurity/definition/malware

You might also like