This document defines hacking and discusses different types of hacking including ethical hacking, malware hacking, and ego hacking. It provides examples of each type, such as using password cracking to gain unauthorized access for ethical hacking or infecting computers with malware to recruit them into botnets. The document also discusses real news stories about hacking, such as intrusions into Malaysian servers and the IRS paying Equifax despite its systems being hacked twice. Finally, it questions the ethics of the IRS paying Equifax given its security failures.
This document defines hacking and discusses different types of hacking including ethical hacking, malware hacking, and ego hacking. It provides examples of each type, such as using password cracking to gain unauthorized access for ethical hacking or infecting computers with malware to recruit them into botnets. The document also discusses real news stories about hacking, such as intrusions into Malaysian servers and the IRS paying Equifax despite its systems being hacked twice. Finally, it questions the ethics of the IRS paying Equifax given its security failures.
This document defines hacking and discusses different types of hacking including ethical hacking, malware hacking, and ego hacking. It provides examples of each type, such as using password cracking to gain unauthorized access for ethical hacking or infecting computers with malware to recruit them into botnets. The document also discusses real news stories about hacking, such as intrusions into Malaysian servers and the IRS paying Equifax despite its systems being hacked twice. Finally, it questions the ethics of the IRS paying Equifax given its security failures.
Hacking Name : Heng Yi Jun Student ID : 1201200318 The definition of hacking • Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. For example of Hacking is using password cracking algorithm to gain access to a system. • Hacking is also an attempt to exploit a computer system or a private network inside a computer. It is the unauthorized access to or control over computer network security systems for some illicit purpose. The types of hacking • Ethical hacking • Malware hacking • Ego Hacking Example of those types hacking • Ethical Hacking- For example, exploiting or exposing a website in order to discover its weak points. Then report your findings and let the appropriate person fix those vulnerabilities. Then in the future, should they come under attack, they will be that bit safer. You are actually preparing them for any real threat of attack because you are eliminating the areas which could possibly be exploited against them. Malware Hacking - A hacker could recruit your computer to a botnet using zombieware. This would have minimal impact on you, personally, but it means they could use your computer as part of a larger-scale attack on a high-value target.
Ego Hacking - In the workshop, we do an experiment where I give
you 10 completely untrue negative comments in a row. You will logically know that none of what I say is true. Within just a minute, your self-esteem and self-confidence would likely be impacted — and you logically know that I wasn’t saying anything real. Real-live news about hacking • News 1 - Malaysia's national cybersecurity agency said it detected intrusions in several local servers for years and issued advisories to victims but ignorance was still making them easy targets for hackers. • News 2 - The IRS is paying Equifax millions for a login system that has been hacked—twice The ethical issue related to the hacking • Why Did the IRS pay Equifax $7.25 Million to Help Prevent Fraud?