Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Hacker

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

COMPUTER

HACKING
# Hacking is breaking into computer systems,
frequently with intentions to alter or modify
existing settings. Sometimes malicious in
nature, these break-ins may cause damage or
disruption to computer systems or networks.
People with malevolent intent are often referred
to as "crackers"--as in "cracking" into
computers.
HISTORY OF
HACKING
Hacking developed alongside "Phone Phreaking", a term
referred to exploration of the phone network without
authorization, and there has often been overlap between
both technology and participants. Bruce Sterling traces
part of the roots of the computer underground to the
Yippies, a 1960s counterculture movement which
published the Technological Assistance Program (TAP)
newsletter. [3
TYPE OF
1) Inside JobsHACKING
- Most security breeches originate
inside the network that is under attack. Inside jobs
include stealing passwords (which hackers then use or
sell), performing industrial espionage, causing harm
(as disgruntled employees..

2) Rogue Access Points - Rogue access points (APs)


are unsecured wireless access points that outsiders can
easily breech. (Local hackers often advertise rogue
APs to each other.) Rogue APs are most often
connected by well-meaning but ignorant employees.
3)Viruses and Worms - Viruses and worms are self-
replicating programs or code fragments that attach themselves
to other programs (viruses) or machines (worms). Both viruses
and worms attempt to shut down networks by flooding them
with massive amounts of bogus traffic, usually through e-mail.
4)Trojan Horses - Trojan horses, which are attached to other
programs, are the leading cause of all break-ins. When a user
downloads and activates a Trojan horse, the hacked software
(SW) kicks off a virus, password gobbler, or remote-control
SW that gives the hacker control of the PC.
5)Denial of Service - DoS attacks give hackers a way to bring
down a network without gaining internal access. DoS attacks
work by flooding the access routers with bogus traffic (which
can be e-mail or Transmission Control Protocol, TCP, packets).
Hacks and
Attacks
An attack in network speak refers to any attempt to break into a compute network,
or packet, as well as any attempt to launch a malicious or self-replicating program.
Attacks fit into multiple categories, many of which are described here.
All network attacks are either active or passive.
Active attacks include injecting malicious files, altering data, or clogging the
network. In theory, you can detect active attacks but not passive attacks.
Passive attacks such as eavesdropping do not actually cause harm to the network,
but hackers can use them to obtain information that enables active attacks. People
looking for passwords can tirelessly try every combination until they find a
working password (a brute-force attack). Man-in-the-middle attacks occur when a
hacker interposes between two valid users and eavesdrops for passwords. Passive
attacks are difficult to detect.
Remote attacks are conducted by people outside the network (those without a
network ID), whereas local attacks use an existing account to exploit the system.
Hit-and-run attacks quickly crash systems, whereas persistent attacks affect the
victims only as long as the attack lasts
DETECTING
HACKER
Hackers, by nature are very stealthy. Their ability to gain
access to your computer through the Internet can easily be
done without your knowledge - and most of them seem to
prefer that approach. Before time is spent on being able to
detect a hacker, it should be noted that a determined
hacker will not be stopped! They will get in - even to the
Department of Defenses systems!
How Hackers Are Caught
With the fact that Microsoft and some other software
companies have been notified - yes, by hackers, that there are
many "holes" in Windows that a hacker can take advantage
of. Microsoft has responded by attempting to fix the "holes"
each time one is pointed out. Then, it sends out a patch to
block hackers from attacking through that "hole." Keeping up
with the update's from Microsoft is one way to close down
the problems that exist in the Windows software - though it is
unknown if all such "holes" will ever be known.
Hacker Tricks And Preventio
Techniques
In movies or TV series where hackers are involved, we
may have seen them apply their computer knowledge in
order to perform certain hacker tricks that saved the day.
From "The Matrix" to "Swordfish", hackers have been
able to elevate themselves to the level of heroes with only
a keyboard and a mouse. However, hackers attacks and
hacker prevention is more difficulty, and complex, in real
life.
How To Prevent Hacker Attacks
Hackers are always looking for a way to get into computers of other
persons. It can be something as simple as phising confidential information
(like credit card or bank account numbers) to complex hacking routines that
use your computer as a repository for illegal content (like music or movies
with copyright).

Unfortunately there is no magical software to prevent hackers; and it will


never exist. It doesn't matter how much money or resources you invest in
designing the perfect system, someone will find the way to crack it. Even
the biggest government agencies like NASA, CIA and NSA have been
victims of hackers. And the same thing happens in the private sector with
companies like Citigroup or Wal-Mart.
Reference:

http://en.wikipedia.org/wiki/Hacker_(computing)

You might also like