You are on page 1of 15

Hacking and

Cracking

Submitted By:
Srinivas H R
JKB19055
Contents
• Introduction
• What is Hacking 
• What is Cracking
•  Objectives of Hacker 
• Objectives of Cracker 
• Difference between Hacking and Cracking 
• Steps to be taken to prevent attacks from Hacking and Cracking
•  Conclusion
Introduction
In the last two decades, there has been a
debate between hackers and crackers.
Both the terms are related to hacking.
Hacking and cracking are the two
categories of a person who is skilled in
hacking. The difference between hackers
and crackers is based on who is well-
versed in systems, how they
function, programming, coding,
and everything else.
What is Hacking
• Hacking is the gaining of access (wanted or
unwanted) to a computer and viewing, copying or
creating data without the intention of destroying the
data or maliciously harming the computer. 
• Hacking is the art of exploitation. 
• Hackers have curiosity on the working of system and
skilled persons. 
• Hackers are good guys who often doesn’t harm the
system or cause damage. 
• Generally Hackers are referred as ‘White Hat’
Hackers.
What is Cracking
•  Cracking is the process of gaining unauthorized access with the intention
of causing damage. 
• The purpose of cracking is to breach or bypass security or gain access to
software without the owner’s knowledge
• Cracker is the name given to hackers who gain access into computers for
criminal Activities. 
• Crackers will have intention to damage the personal data or break the
security 
• Generally Crackers are referred as ‘Black Hat’ hackers.
Objectives of Hacker
• Gaining access to the system by authorized or unauthorized
means. 
• No intention to cause damage to the system or break the system,
they will view, copy and access the data. 
• Hackers are often hired so as to secure the data by detecting
vulnerabilities. 
Objectives of Cracker
• Gaining access to the system by
unauthorized means thus breaking the
security.
• Crackers will steal the data, causing damage
to the system. 
•  Crackers steal the data by reverse
engineering (using the software created by
hackers). 
• Crackers break the system by malicious
way introducing a virus into the system.
Difference between Hacking and Cracking
Hacking Cracking

1. Legal activity Illegal activity

2. Make the code Break the code

3. Doesn’t damage the data Damage the data

4. Ethical professionals Unethical persons

5. Have legal Certificates They are anonymous

6. Good people, Hack for Knowledge purpose Evil person who breaks into system with malicious
intent
Indian Legal Provisions
• Section 43 and Section 66 of the Information Technology Act, 2000 cover
the civil and criminal offenses of data theft and hacking respectively
• When a person takes away or steals the information in order to move it
away from the access of the authorised user, it can be termed as theft 
under Section 378 of IPC. If such an act fulfills all the essentials of the
theft, the act committed will attract penal consequences under IPC as well
Punishment
• Under the Information Technology Act, 2000, According to Section 66, the punishment
is imprisonment up to 3 years, or a fine which may extend up to 2 lakh rupees, or both
• According to Section 43, liability is to pay damages by way of compensation to the
person affected by the stealing of the data.
•  Section 66  entails punishment for receiving stolen computer resources or information.
The punishment includes imprisonment for one year or a fine of rupees one lakh or both.
• The maximum punishment for theft under Section 378 of the IPC is imprisonment of up
to 3 (three) years or a fine or both.
Jagjeet Singh v. The State of Punjab, 2021
In this case, it was alleged by the company that some of its ex-employees have stolen
their content and databases and transferred it to some other company. The main issue in
the case was whether the petitioner can invoke the non- bailable offences under IPC i.e,
data theft and hacking?
Verdict – The apex court held that in cases of data theft and hacking, the offences under
the Indian Penal Code will also be applied along with the penal provisions of the IT Act,
and this would not exclude the application of the IPC. This shows the gravity with which
the judiciary has regarded the crime of hacking holding hackers or the culprits liable
under two acts i.e., IPC and IT Act.
Kumar v. Whiteley
Facts  
The accused, i.e Kumar gained unauthorized access to the Joint Academic Network
(JANET) and deleted, added files, and changed the passwords to deny access to the
authorized users which led to a loss of Rs. 38,248 to the users. 
Verdict 
The Additional Chief Metropolitan Magistrate of Chennai sentenced N G Arun Kumar,
the accused to undergo rigorous imprisonment for one year with a fine of Rs. 5,000
under Section 420 IPC (cheating) and Section 66 of the IT Act (Computer related
Offense)
Steps to be taken

Be Use Use Click  Don’t exchange

 cautious in sharing Never use unknown Always use updated Never click on spam Don’t exchange
data with the public Wi-Fi Anti-Virus in your links that are transactions on non
unknown websites.  networks that are system.  publishing day to day https web pages.
free and share your widely in social
personal data by networks (click
public network. jacking).
Conclusion
• There is no doubt that hacking poses a serious threat to the virtual world. Not
many people in the country are aware of this theft. There needs to be more
awareness in the country regarding hacking and cracking.
• The laws made by the government are stringent but lack a bit of
enforceability and awareness in the society. Most of the minor cases of
hacking go unnoticed because people abstain from filing cases for petty
crimes even when there is harsh punishment for it.
• Also, it is very difficult to track a virtual hacker due to lack equipment. Since
hacking can happen anywhere in the world, it gets tough for the police to
trace him and punish him in another country.
References
• https://techilive.in/
• https://www.guru99.com/
• https://hackernoon.com/
• https://blog.malwarebytes.com/
• https://blog.ipleaders.in/

You might also like