You are on page 1of 7

FACULTY OF EDUCATION

NAME: LUBANGA LAWRENCE

REG. NO: 23/1/314/DJ/784

COURSE: BIT

YEAR: I

SESSION: II

TASK: COURSEWORK

COURSE UNIT: NETWORKING

LECTURER: BUKOLI HERBERTSON

QUESTION

Write short notes hacking


HACKING
Hacking is the act of identifying and then exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to personal or organizational data.
Or
Hacking in cyber security refers to the misuse of devices like computers, smartphones, tablets,
and networks to cause damage to or corrupt systems, gather information on users, steal data and
documents, or disrupt data-related activity.

Traditional view of hackers is a lone rogue programmer who is highly skilled in coding and
modifying computer software and hardware systems. But this narrow view does not cover the
true technical nature of hacking. Hackers are increasingly growing in sophistication, using
stealthy attack methods designed to go completely unnoticed by cyber security software and IT
teams. They are also highly skilled in creating attack vectors that trick users into opening
malicious attachments or links and freely giving up their sensitive personal data.

As a result, modern-day hacking involves far more than just an angry kid in their bedroom. It is a
multibillion-dollar industry with extremely sophisticated and successful techniques.

HISTORY OF HACKING/HACKERS

Hacking first appeared as a term in the 1970s but became more popular through the next decade.
An article in a 1980 edition of Psychology Today ran the headline “The Hacker Papers” in an
exploration of computer usages addictive nature. Two years later, two movies, Tron and War-
games, were released, in which the lead characters set about hacking into computer systems,
which introduced the concept of hacking to a wide audience and as a potential national security
risk.

Sure enough, later that year, a group of teenagers cracked the computer systems of major
organizations like Los Alamos National Laboratory, Security Pacific Bank, and Sloan-Kettering
Cancer Center. A Newsweek article covering the event became the first to use the word “hacker”
in the negative light it now holds.

This event also led Congress to pass several bills around computer crimes, but that did not stop
the number of high-profile attacks on corporate and government systems. Of course, the concept
of hacking has spiraled with the release of the public internet, which has led to far more
opportunities and more lucrative rewards for hacking activity. This saw techniques evolve and
increase in sophistication and gave birth to a wide range of types of hacking and hackers.

Kevin Mitnick's Biography. Born Aug 6, 1963, Kevin David Mitnick grew up immersed in the
era of newly emerging phone and computer technology. And, boy, did it fascinate him

REASON WHY HACKERS HACK

Vulnerability Scanning. Vulnerability scanning is a security technique employed for identifying


security weaknesses in a computer system. This security measure is mostly used by network
administrators for obvious security reasons. However, hackers can also infiltrate this security
method to gain unauthorized access, thus opening the door to other infiltration tactics and
motivations. Vulnerability scanning is essentially considered to be the gateway to additional
attacks.

Unauthorized Code Execution. Or bot. Thus, the very aspect of possessing unprecedented
access can lead to an infecting an Unauthorized Code Execution motives can be a bit
complicated. Typically, hackers aim at computer. Running unauthorized code can be one of the
first steps in turning a user's computer into a zombie user with malware to take control of said
user's computer via the execution of a code or commands. This extremely powerful form of
hacking permits hackers to take complete control of the victim’s unlimited number of suspicious
activities that a hacker can accomplish without even a trace of being caught.

Money. No surprises here, a lot of hackers are simply motivated by money. Hackers don’t just
hack businesses and ask for a ransom, they also try hacking into regular user accounts and try to
take advantage of things like online banking, online retail or anywhere where financial
transactions are involved. In 2020 the biggest ransom ware attack occurred called WannaCry
where millions of computers around the world were hacked and users had to pay a ransom to get
access back to their computers. Hackers will infiltrate a company’s database of credit card
information and use it to generate duplicate credit cards or steal the identities of victims. Once an
identity is stolen, the thief can open up credit accounts in the victim’s name and ring up
thousands of dollars in charges. Larger organizations are obviously a more attractive target to a
hacker, but ransom ware against individuals via phishing schemes can also attract a sizable
payout.
Steal/Leak Information. One of the most common reasons for hackers to hack is to steal or leak
information. This could be data and information about your customers, your employees or
private business data. One of the biggest and most public examples of this, is the Ashley
Madison hack, where hackers were able to break into the customer database and get access to all
of the site’s information. This incident was a big shakeup in the world of technology and hugely
affected the lives of many people.

Disruption. These hackers don’t care about money or data; they seem to feel that they have a
higher purpose in life. Sometimes known as ‘Activism’, some hackers are driven by a specific
purpose. They take it upon themselves to expose injustice. Some have political, environmental,
religious or moral motives, and they are hacking in an attempt to be heard, make a difference and
to promote a particular agenda. A major example is the activist group ‘Anonymous’ who have
been known worldwide for challenging and taking down many governments.

Espionage. Espionage is another type of theft except, instead of direct financial gain, the
hackers are seeking protected information. Both governments and private organizations can be
victims of information theft, and the information stolen can be either sold or used by adversaries
to gain tactical advantages. Generally speaking, those who hack into governments are seeking
state secrets while those who hack into private organizations are seeking trade secrets.

Spamming. Some malware can take over your web browser’s systems and overwhelm you with
unwanted ads. It’s from this that spammers are able to steal passwords so they can use your e-
mail or social media accounts to spam others in an attempt to sell products.

Vulnerability Testing. One of the best ways to test your systems and security measures is to
have it hacked. Many Cyber security firms, government agencies, and a number of large
businesses actively employ hackers to test their systems, locate vulnerabilities, and
develop protections.

Fun. A lot of hackers will tell you that breaking into a secure system is an enjoyable hobby that
tests their knowledge and skills. For these people, the only motivation is to gain some experience
and have some fun. Yes crazy but true!

WHY DO PEOPLE GET HACKED


Flawed human decisions, such as poor password selection, misuse of access privileges or trusting
the wrong person, are major reasons people get hacked. Social engineering scams, in which an
outside actor poses as a trusted colleague or associate to obtain passwords or confidential
information, rely on human error. While many people think software security is the only way to
stop cybercriminals from using these hacking opportunities, cyber security awareness training
can give employees the tools they need to recognize and report suspicious activity before a
breach occurs.

A FEW OF THE MOST COMMON TYPES OF HACKERS THAT CARRY


OUT THESE ACTIVITIES INVOLVE.
Black Hat Hackers. Black hat hackers are the "bad guys" of the hacking scene. They go out of
their way to discover vulnerabilities in computer systems and software to exploit them for
financial gain or for more malicious purposes, such as to gain reputation, carry out corporate
espionage, or as part of a nation-state hacking campaign. These individuals’ actions can inflict
serious damage on both computer users and the organizations they work for. They can steal
sensitive personal information, compromise computer and financial systems, and alter or take
down the functionality of websites and critical networks.
White Hat Hackers

White hat hackers. can be seen as the “good guys” who attempt to prevent the success of black
hat hackers through proactive hacking. They use their technical skills to break into systems to
assess and test the level of network security, also known as ethical hacking. This helps expose
vulnerabilities in systems before black hat hackers can detect and exploit them. The techniques
white hat hackers use are similar to or even identical to those of black hat hackers, but these
individuals are hired by organizations to test and discover potential holes in their security
defenses.

Grey Hat Hackers. Grey hat hackers sit somewhere between the good and the bad guys. Unlike
black hat hackers, they attempt to violate standards and principles but without intending to do
harm or gain financially. Their actions are typically carried out for the common good. For
example, they may exploit a vulnerability to raise awareness that it exists, but unlike white hat
hackers, they do so publicly. This alerts malicious actors to the existence of the vulnerability.
DEVICES MOST VULNERABLE TO HACKING
Smart Devices. Smart devices, such as smartphones, are lucrative targets for hackers. Android
devices, in particular, have a more open-source and inconsistent software development process
than Apple devices, which puts them at risk of data theft or corruption. However, hackers are
increasingly targeting the millions of devices connected to the Internet of Things (IoT).
Webcams. Webcams built into computers are a common hacking target, mainly because hacking
them is a simple process. Hackers typically gain access to a computer using a Remote Access
Trojan (RAT) in rootkit malware, which allows them to not only spy on users but also read their
messages, see their browsing activity, take screenshots, and hijack their webcam.
Routers. Hacking routers enables an attacker to gain access to data sent and received across
them and networks that are accessed on them. Hackers can also hijack a router to carry out wider
malicious acts such as distributed denial-of-service (DDoS) attacks, Domain Name System
(DNS) spoofing, or crypto mining

Email. Email is one of the most common targets of cyber-attacks. It is used to spread malware
and ransom ware and as a tactic for phishing attacks, which enable attackers to target victims
with malicious attachments or links.
Jailbroken Phones. Jailbreaking a phone means removing restrictions imposed on its operating
system to enable the user to install applications or other software not available through its
official app store. Aside from being a violation of the end-user’s license agreement with the
phone developer, jail breaking exposes many vulnerabilities. Hackers can target jail broken
phones, which allows them to steal any data on the device but also extend their attack to
connected networks and systems.

PREVENTION FROM GETTING HACKED


There are several key steps and best practices that organizations and users can follow to ensure
they limit their chances of getting hacked
Software Update. Hackers are constantly on the lookout for vulnerabilities or holes in security
that have not been seen or patched. Therefore, updating software and operating systems are both
crucial to preventing users and organizations from getting hacked. They must enable automatic
updates and ensure the latest software version is always installed on all of their devices and
programs.
Use Unique Passwords for Different Accounts. Weak passwords or account credentials and
poor password practices are the most common cause of data breaches and cyber-attacks. It is vital
to not only use strong passwords that are difficult for hackers to crack but also to never use the
same password for different accounts. Using unique passwords is crucial to limiting hackers’
effectiveness.
HTTPS Encryption. Proofed websites are another common vehicle for data theft, when hackers create
a scam website that looks legitimate but will actually steal the credentials that users enter. It is important
to look for the Hypertext Transfer Protocol Secure (HTTPS) prefix at the start of a web address. For
example: https://www.fortinet.com.

Avoid Clicking on Ads or Strange Links. Advertisements like pop-up ads are also widely used
by hackers. When clicked, they lead the user to inadvertently download malware or spyware onto
their device. Links should be treated carefully, and strange links within email messages or on
social media, in particular, should never be clicked. These can be used by hackers to install
malware on a device or lead users to spoofed websites.
Change the Default Username and Password on Your Router and Smart Devices. Routers
and smart devices come with default usernames and passwords. However, as providers’ ship
millions of devices, there is a risk that the credentials are not unique, which heightens the
chances of hackers breaking into them. It is best practice to set a unique username and password
combination for these types of devices.

You might also like