Monday, 1 October 2012

HACKING

Hacking definition
                     
Before going to see what is hacking we should now about history Hacking. I mean when does its start's in which it has been implemented at first and who was the founder of hacking.
Hacking is not limited to computers. The real meaning of hacking is to expand the components of any electronic device; to use them beyond the original intentions of the manufacture.
Hacker is a term used by some "a clever programmer" and by others, especially those in popular media, to mean "someone who tries break into computer systems."

What does ethical hacking means?
After entering 21st century we came across a very useful technical term Internet and that was also open for public use but not in the mass while in comparison of past 10 years we are watching everyone hanging around the sites and even some of them became popular for the term hacking being a hacker to make others web pages hack and get unethical access over all the system and information without owner’s interest.
And now we are also talking about Ethical Hacking, so what the term is this? And why we should all bother about it during handling a website or managing other’s property online being a part time or full time employee or the consultant.
If you are interested to get the exact definition of Ethical Hacking that would really not be different than all the following as below and already out there at the Internet
1). Ethical hacking can be defined as a legal access of an Internet geek in any organization and their online property after their own permission to make it all clear that how secure they are or not.
Or you can say the organization takes a test of their security status online or offline by hiring some expert or an individual.
2). Ethical Hackers are the white hat peoples who use their knowledge for the sake of their countrymen and their security basically online. They also work for cyber crime department under the security departments.
 3). Ethical hacking can also be called the term when we get’s access in our own or others account after the recommendations to get that all back what was previously stolen by a hacker.

History of Hacking

 

Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT.
Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter.TAP was a phone phreaking newsletter that taught the techniques necessary for the unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa.

Hacking Types
                    
1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breaches.

2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.

3) Back Doors - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.

4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.

6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).

Classifications

 

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond advocates that members of the computer underground should be called crackers. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system”. These subgroups may also be defined by the legal status of their activities.

White hat

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants has developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal”. Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".

Differences Between White Hat And A Black Hat Hacker

The difference between black hat and white hat hackers is that white hat hacker uses their skills and knowledge as a way to defend someone from attackers. That means that white hat hackers offer their services to corporations, public organizations and educational institutions.
These services include a complete revision of their computer network security, implementation of new security systems (they may be hardware or software), user training and future recommendations. All these measures will be able to combat unauthorized hacking; black hat hackers, however, will continue trying
.

What is Hacktivism?
                          
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.
Hacktivism is the use of computers and computer networks as a means of protest to promote political ends. The term was first coined in 1996 by a member of the Cult of the Dead Cow hacker collective named Omega. hacking as "illegally breaking into computers" is assumed, and then hacktivism could be defined as "the use of legal and/or illegal digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, typo squatting and virtual sabotage. If hacking as "clever computer usage/programming" is assumed, and then hacktivism could be understood as the writing of code to promote political ideology: promoting expressive politics, free speech, human rights, and information ethics through software development.
A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.

How To Prevent Hacker Attacks

 

Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phising confidential information (like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright).

Unfortunately there is no magical software to prevent hackers; and it will never exist. It doesn't matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. Even the biggest government agencies like NASA, CIA and NSA have been victims of hackers.

Computer hacking and the laws

                        

Computer hacking is illegal and carries a possible sanction of imprisonment. Computer hacking has been thrown into the public eye recently with increasing allegations that certain newspapers hired private investigators to hack into people’s phones and computers in order to obtain stories that would sell.
An increasing concern to all governments around the world is the role of what is known as cyber attacks. Cyber attacks occur when an individual or group of individuals hack into the computer system of a company, association or even government department and attempts to paralyze the system.
The motivation for carrying out a cyber attack can be vast; groups can range from those seeking information to sell on, to interest groups looking to bring down whole companies, and even terrorist groups looking to paralyze government departments.
It is on account of the vast increases in cyber attacks in recent years that government spending has increased dramatically in a bid to protect national security information. Enforcement is taking place, but we have to wonder if computer hacking laws are really having any effect against cyber hacking. This article will show what is being done against cyber crime.

Effectiveness of Computer Hacking Laws

 

Like any other law, the effectiveness must be determined by its deterrence. While there will always be those that want to see if they can do it, and get away with it (any crime), there are always the many more who may not do something if they are aware of its unlawfulness - and possible imprisonment.

No comments:

Post a Comment