Monday, 6 March 2017

Introduction

Hey guys! This is my first blog and in this I'm going to provide a basic introduction about hacking. Different people define hacking differently. I define hacking as gaining access by exploiting the weakness in any computer system or any network. And the person who finds and exploit these weakness is known as a hacker. A hacker is usually a skilled computer programmer having knowledge about computer security and networking.

Types of Hackers

  • Ethical Hacker (or White hats): A hacker who gains access to systems with a view to fix the identified weaknesses.They may also perform penetration testing and vulnerability assessments. 
  • Cracker (or Black hats): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc
  • Grey hats: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
  • Script kiddies: A non-skilled person who gains access to computer systems using already made tools.
  • Hacktivists: A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website. One of the well known hacktivist group is Anonymous.
  • Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.

Is hacking a Cyber-crime?

Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc.  Most cybercrimes are committed through the internet. Since hacking is breaking into a security (illegally), it is considered as a cyber-crime. But what about the white hats? Are they considered as cyber-criminals too? The answer is NO!

What is Ethical Hacking?

Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules.
  • Get written permission from the owner of the computer system and/or computer network before hacking.
  • Protect the privacy of the organization being hacked.
  • Transparently report all the identified weaknesses in the computer system to the organization.
  • Inform hardware and software vendors of the identified weakness.
Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business. Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.

5 comments: