The Benefits and Drawbacks of Computer Hacking
Table of contents
The endless mission of human personality has imagined to every vital innovation of the world. Hacking goes back its beginning to a similar human inclination to know and subsequently investigate things. Computer Hacking is a routine with regards to peeping into the extraordinary specialized points of interest of any PC application, program, or the entire framework keeping in mind the end goal to expand its capacities or change its functionalities. Individuals who properly take after this routine with regards to hacking are named as 'hackers'. A hacker's vision towards taking care of any specialized issue is without a doubt past the impression of any typical PC master. The open-source coding has been extremely gainful for hackers to test and concoct out of their energy for programming, say UNIX is the best example. This practice can either be moral or exploitative. The movement where one breaks into the framework however don't disregard its security and qualifications is called Ethical Hacking. Ethical hackers intend to bring into the overseer's notice, vulnerabilities and voids in the system thereby, improvising the robustness and security. They are absolutely tech-nerds with faultless programming aptitudes and hands-on information on both PC equipment and programming. Then again, there are individuals who can however break into frameworks, access secured accounts yet their activities are generally unapproved while they make a secondary passage section into your framework. These individuals (frequently misjudged as programmers) are called as 'crackers'. They attempt and split passwords, security codes, and so forth utilizing different hacking programming projects which are as of now accessible. Such virtual products are intended to break the code utilizing a great many trials customized into it by other hackers.
Type of Hacker :
1. Script Kiddie - Script Kiddies typically not care about hacking. They duplicate the code and utilize it for a virus or a SQLi or something different. Script Kiddies will never hack for themselves; they'll simply download abused programming (LOIC or Metasploit, for instance) and watch a YouTube video on the most proficient method to utilize it. A typical Script Kiddie assault is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they surge an IP with so much data it crumples under the strain. This assault is much of the time utilized by the 'hacker' group Anonymous, which doesn't help anybody's reputation. 2. White Hat – White Hat in another word is called ethical hacker, White Hat hackers are the great folks of the hacker world. They'll enable you to evacuate a virus or PenTest an organization. Most White Hat hacker hold a college degree in IT security or computer science and should be confirmed to pursue a career in hacking. The most famous affirmation is the CEH (Certified Ethical Hacker) from the EC-Council. 3. Black Hat - Black Hat is called crackers, these are the men and ladies you catch wind of in the news. They discover banks or other organizations with weak security and steal money or credit card information. The astonishing truth about their strategies of attack is that they regularly utilize common hacking practices they learned early on. 4. Gray Hat - Gray Hat is nothing ever just simply dark or white; the same is valid in the world of hacking. Gray Hat hackers don't steal money or information (although, now and then they mutilate a website or two), yet they don't help individuals for good (at the same time, they could if they needed to). These hackers contain the greater part of the hacking world, despite the fact that Black Hat hackers garner most (if not all) of the media's consideration. 5. Green Hat - These are the hacker 'n00bz,' however not at all like Script Kiddies, they think about hacking and strive to become full-blown hackers. They're frequently flared by the hacker group for making numerous questions. At the point when their inquiries are replied, they'll tune in with the goal and curiosity of a child in to family stories. 6. Red Hat - Red Hat are the vigilantes of the hacker world. They're similar to White Hats in that they stop Black Hats, yet these people are absolute SCARY to the individuals who have ever attempted to such an extent as PenTest. Rather than detailing the vindictive hacker, they close him/her around transferring infections, DoSing and getting to his/her PC to demolish it from the inside out. They use various forceful techniques that may compel a wafer to require another PC. 7. Blue Hat - Blue hat is another type of hacker. If a Script Kiddie rendered retribution, he/she may turn into a Blue Hat. Blue Hat hackers will look for retaliation on those who've them irate. Most Blue Hats are n00bz, yet like the Script Kiddies, they want to learn.
Types of Hacking
We can isolate hacking into various categories, in view of what is being hacked. Here are some examples: Website Hacking − Hacking a website taking unapproved control over a web server and its related software such as databases and other interfaces. Network Hacking − Hacking a network is to gather information about a network by using devices like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation. Email Hacking − It getting unapproved access on an Email account and using it without taking the assent of its proprietor. Ethical Hacking – Ethical hacking involves discovering weaknesses in a computer or network system for testing reason lastly getting them settled. Password Hacking – This is the process of recuperating secret passwords from information that has been put in or transmitted by a computer system. Computer Hacking – This is the way taking computer ID and password by applying hacking strategies and getting unapproved access to a computer system.
Definition of Hacking
Purpose of the hacking In 1950, hacking is begun with a purpose of finding simple solutions or ways around technical problems when dealing with computing systems. Different hackers have different purpose of hacking. There are some purposes of hacking.
1. Hacking for fun. Some hacker hacking is just for fun. They hack to others computer or network is to show off their hacking skill with their peers or friends and hacking is just a challenge for them. 2. Hacking to steal. Another purpose of hacking is to steal information and money. A large portion of hacking attempts fall into this category. Bank and large organization is the victim in this category. 3. Hacking to disrupt. Some hacker or hacking group will hack to target company and the purpose is to disrupt the image of that particular company and disrupts its business also. 4. Hacking to evaluate the network or system’s infrastructure also is the one of the purpose of hacking. Ethical hacking is to evaluate the network or system’s infrastructure. It entails finding and attempting to exploit any vulnerability to determine whether unauthorized access or other malicious activities are possible.
Usage Of Hacking
1. Some user use the hacking technologic to help to remove virus and help people to understand where their vulnerabilities are and fix them. 2. Besides that, some hackers hacking is to steal the information of a company or steal the money from the bank customer. 3. In another hand, some hackers is the vigilantes of the hackers world. This hacker will help shut the malicious hacker down by uploading viruses and accessing their computer to destroy it from the inside out. 4. Some hacker hacking is just because hacking is one of the games for them and without doing anything harmful. They just feel bored and want to play something.
Function of Hacking
1. One of the function of hacking is hacking can help us to recover the loss information in our computer. 2. Besides that, ethical hacking can prevent malicious hacking and prevent national security breaches. 3. In another hand, hacking also can help us to understand the computer problem and help us to remove the viruses. Samples of Hacking Cases
James hacks NASA Jonathon James (Hacker name known as Comrade), 16 years old in 1999 hacked into the Marshall Space Flight Center in Huntsville, Alabama. He downloaded proprietary software for the International Space Station. The software supported the International Space Station's physical environment and was responsible for critical control of humidity and temperature for living in space. The official value documents that stole by Jonathon James at around $1.7 million. In that time, NASA shut down computer three weeks and cost them around $41,000 to fix it. 2. Adrian Lamo hacks the New York Times Adrian Lamo, in 2002 at age 19 hacked into the internal network of the New York Times and accessed many sensitive records, including an extensive database of op-ed writers the paper had used in the past. The records contained names and, in some instances, phone numbers, home addresses and payment history on contributors such as Democratic strategist James Carville, former secretary of state James Baker.. Lamo added his own name to the list of 'experts' and under 'expertise' he wrote 'Computer hacking, national security, communications intelligence.'
Gary Mckinnon Hacks The US Military
Gary McKinnon who went by the handle Solo, was accused of hacking to several US military computers in 2001 and 2002. McKinnon hack into US military because he wanted to know what the government knew about UFOs. According to the Military officials said, McKinnon damage and deleted many files. He deleted the critical files from operating systems, prompting a shut down the US Armys Military District of Washington network of 2,000 computers for 24 hours included. McKinnon also deleted weapons logs at the Earle Naval Weapons Station. Officials said the cost of cleanup from McKinnons hack was over $700,000. 4. WannaCry virus hits the NHS, 2017 The most widespread cyber-attack ever, hackers managed to gain access to the NHS' computer system in mid-2017, causes chaos among the UK's medical system.The same hacking tools were used to attack world-wide freight companyFedEx and infected computers in 150 countries. Ransom ware affectionately named 'WannaCry' was delivered via email in the form of an attachment.Once a user clicked on the attachment, the virus was spread through their computer, locking up all of their files and demanding money before they could be accessed again. As many as 300,000 computers were infected with the virus. It was only stopped when a 22-year-old security researcher from Devon managed to find the kill switch, after the NHS had been down for a number of days.
Popularity Among The Users For Using Hacking
Most of the users (hacker) hacking is to steal the information or money. This type of hacker is known as black hat hackers. Black hat hackers will spread the viruses to network or computer and steal credit card number and password or others financial information. Black hat hackers also will steal some organization important document and sell it to that particular organization’s competitor and earn money. Some black hat hackers will use non-computer method to obtain data. For example, calling, and assuming an identity in order to get a user's password. According to the diagram above, most of the motivation of hacking is cyber crime. Simply put, popularity among the user(hacker) is to steal information or money or do some illegal activities. Most of the hackers in the world nowadays is black hat hackers.
Benefit of Hacking
Testing Securities Measures
The essential favorable position of having moral hacker on an organization's finance is that the hacker are allowed to test an organization's safety efforts in a controlled, safe condition. Hacker can enable organizations to figure out which of their PC safety efforts are suitable, which measures require refreshing, and which ones posture next to zero hindrance to unsafe gatecrashers. The information from these tests enables administration to settle on educated choices on where and how to enhance their data security.
Preparing For Hacker Attack
Organizations that handle sensitive information must comprehend that they fill in as potential focuses of a hacker assault. Littler organizations that do not have the assets for satisfactory system security give dark cap hacker enticing focuses of chance. These assaults can handicap or demolish independent companies as much as a fire or a cataclysmic event. The utilization of white hat hacker can demonstrate these organizations that they are so helpless against an attack and how crushing the outcomes of such an attack can be.
Understanding Hacker Techniques
White hat hacker can in like manner show the systems utilized by exploitative intruders. These showings serve to indicate administration how criminals, psychological militants and vandals can attack their frameworks and devastate their organizations. At the point when administration has a firm handle on the ideas that dark cap programmers utilize, they can likewise figure out how to keep those trespassers from utilizing those procedures to penetrate their powerless frameworks.
Finding Vulnerable Areas
At the point when the white hat hacker wrap up the organization's framework, they hand over investigate the framework's powerless areas. These areas can be identified with the innovation, for example, an absence of adequate password encryption, or in human-based frameworks, for example, managers who give out passwords to unapproved faculty. The introduction of these vulnerabilities enables administration to introduce more secure methodology to keep attackers from abusing either the PC systems or the mix-ups of their own work force. · Can become a good Hacker Hacking can enable you to end up plainly a better than average developer, as you would in all likelihood know about the numerous security dangers and shortcomings while making/refreshing programming. Can be used to recover lost information Hacking makes us aware about the possible loopholes of the any framework. It also can be utilized to recover the lost data where the PC secret key has been lost.
Limitation Of Hacking
Hacking is quite dangerous if it is done with harmful intent. It can cause various of harmful effect to the society.
Massive Security Breach. ·
Private information such as name, contact number, bank account number as well as sensitive information such as social security numbers, birthdays, addresses, and in some instances, driver's license numbers has explore by hackers for some illegal crime purpose. Unauthorized system access on private information. Unauthorized disclosure of information can happen if they fail to effectively safeguard their content. Important or private document might lose to hacker by viruses such as Trojan House. Additionally, it might cause interruption of daily operation, some companies will take this opportunity to harm competitor’s reputation and could serve as a black mark on its otherwise sterling operations. · -Privacy violation. Customer ID or password, that consider as user privacy, has mishandling by some illegal hackers. Privacy violations occur when Users information enters the program. The data is written to an external location, such as the console, file system, or network database.
Hampering System Operation.
It occurs when hackers trying to prevent or make it difficult to what you trying to do or complete. It usually done just for fun, or for interrupt others business normal daily operation.
Denial Of Service Attacks.
Denial of service attacks occurs when the perpetrators seeks to create a device or network resource that is unavailable to its intended users by temporarily or indefinitely disrupting services of a host linked to the Internet.
Future Challenges of Hacking ·
Cyber Securities Will Become Better
The impact or success rate of hacking will be reduced due to the improvement of cyber security. For example, a lot of hackers will try to hack into organizations and try to steal the private information so that the organizations will improve their securities to ensure their data are safety. ·
Have To Learn Better Hacking Technique
Nowadays in every single organization having a powerful firewalls to protect their secret information of their company. For instance, if someone wants to hack into an organizations system must have a high technic to access into the system although it will become failure to hack into. This is due to the firewall will help an organization’s PC from hacker who may attempt to access crash it, erase data, or even take passwords or other sensitive data. Human awareness become more sensitive In this technological social, hacking behavior is a popular issue among the people. Nowadays people become more aware of this issue so that while people want to set a set of password they would not simply put some easy number or alphabet because this can easily hack by hacker. For example, sometimes we will get some message like get some free ticket or free things online by sharing the message to your friends or someone. When people believe this message is the real so than the hacker can easily steal your personal information. This is call Phishing. However, a phishing e-mail has been detected a long time ago so people will not easily get into these fake messages.
Recommended
Highly recommended to university’s IT department so that they could more understand about hackers technique for improving the system in protecting the students and lectures private information would not explore to hackers in illegal purpose or crime. Hence, it can be testing security measure so that university could know how far the protection can protect the internal database and can make improvement on it. On the other hand, it could help a lot in preparing for an cyber-attack, with the reason university handle various of sensitive data must so they might be the potential targets of a hacker attack.
Conclusion.
In conclusion, ethical hacking can bring a lot of benefit to our society but in the same time it might also bring huge impact to society if its mishandle in the wrong hand. Is our responsibility to gain more knowledge about hacking to protect our own and the society. We do feel lucky to have chances to explore IT subject in Quest International University Perak, it help us a lot in understanding the important and the benefit could bring to us our future generation.
Cite this Essay
To export a reference to this article please select a referencing style below