HACKING TERMINOLOGY - THE PROCESSES INVOLVE

 



Common Hacking Terminologies

Ø What is Cyber Crime?

Ø Types of Cyber Crime

Ø What is Ethical Hacking?

Ø Why Ethical Hacking?

Ø Legality of Ethical Hacking

Ø Skills Required to Become an Ethical Hacker

Ø What is a programming language?

Ø Summary

INTRODUCTION OF CYBER CRIME

Computers have become mandatory to run a successful business. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses.

This exposes them to the outside world and hacking.

Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc.

Cybercrime cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.

 



What is Cyber crime?

Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc.

Most cybercrimes are committed through the internet.

Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications.

Type of Cybercrime

The following list presents the common types of cybercrimes:

1.     COMPUTER FRAUD: Intentional deception for personal gain via the use of computer systems.

2.     PRIVACY VIOLATION: Exposing personal information such as email addresses, phone number, and account details, etc. on social media, websites, etc.

3.     IDENTITY THEFT: Stealing personal information from somebody and impersonating that person.

4. SHARING COPYRIGHTED FILES/INFORMATION: This involves distributing copyright protected files such as eBooks and computer programs etc.

5.     ELECTRONIC FUNDS TRANSFER: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.

6.   ELECTRONIC MONEY LAUNDERING: This involves the use of the computer to launder money.

7.  ATM FRAUD: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.

8.   DENIAL OF SERVICE ATTACKS: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

9. SPAM: Sending unauthorized emails. These emails usually contain advertisements.

 



What is Ethical Hacking?

Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.

Ø  Get written permission from the owner of the computer system and/or computer network before hacking.

Ø     Protect the privacy of the organization been hacked.

Ø  Transparently report all the identified weaknesses in the computer system to the organization.

Ø     Inform hardware and software vendors of the identified weaknesses.

 

Legality of Ethical Hacking

Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking.

Skills Required to Become aN Ethical Hacker

Skills allow you to achieve your desired goals within the available time and resources.

As a hacker, you will need to develop skills that will help you get the job done.

These skills include learning how to program, use the internet, good at solving problems, and taking advantage of existing security tools.

What is a programming language?

A programming language is a language that is used to develop computer programs. The programs developed can range from operating systems; data based applications through to networking solutions. 

Why should you learn how to program?

Hackers are the problem solver and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from “Script Kiddies”.

Writing programs as a hacker will help you to automate many tasks which would usually take lots of time to complete.

Writing programs can also help you identify and exploit programming errors in applications that you will be targeting.

You don’t have to reinvent the wheel all the time, and there are a number of open source programs that are readily useable.

You can customize the already existing applications and add your methods to suit your needs.

OTHER SKILLS

In addition to programming skills, a good hacker should also have the following skills:

Know how to use the internet and search engines effectively to gather information.

Get a Linux-based operating system and the know the basics commands that every Linux user should know.

Practice makes perfect, a good hacker should be hard working and positively contribute to the hacker community.

He/she can contribute by developing open source programs, answering questions in hacking forums, etc.

SUMMARY

·     Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.

·    Cybercrime is committing a crime with the aid of computers and information technology infrastructure.

·    Ethical Hacking is about improving the security of computer systems and/or computer networks.

·        Ethical Hacking is legal

The common computer system threats and how you can protect systems against them.

·        Topics covered in this lesson

·        What is a Security Threat?

·        What are Physical Threats?

·        What are Non-physical Threats?

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure.

Knowing how to identify computer security threats is the first step in protecting computer systems.

The threats could be intentional, accidental or caused by natural disasters.

What is a Security Threat?

Security Threat is defined as a risk that which can potentially harm computer systems and organization.

The cause could be physical such as someone stealing a computer that contains vital data.

The cause could also be non-physical such as a virus attack.

In this class, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.

 

WHAT ARE PHYSICAL THREATS?

A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.

The following list classifies the physical threats into three (3) main categories;

Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.

External: These threats include Lightning, floods, earthquakes, etc.

HUMAN: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

To protect computer systems from the above mentioned physical threats, an individual must have physical security control measures.

The following list shows some of the possible measures that can be taken:

INTERNAL: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.

External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.

Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.


WHAT ARE NON-PHYSICAL THREATS?

A non-physical threat is a potential cause of an incident that may result in loss or corruption of system data.

Disrupt business operations that rely on computer systems.

Loss of sensitive information.

Illegal monitoring of activities on computer systems.

The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats:

·        Virus

·        Trojans

·        Worms

·        Spyware

·        Key loggers

·        Adware

·        Denial of Service Attacks

·        Distributed Denial of Service Attacks

·        Unauthorized access to computer systems resources such as data

·        Phishing

 

OTHER COMPUTER SECURITY RISKS

To protect computer systems from the above-mentioned threats, an individual must have logical security measures in place.

The following list shows some of the possible measures that can be taken to protect cyber security threats

·    To protect against viruses, Trojans, worms, etc. an individual can use anti-virus software. In additional to the anti-virus software, an organization/individual can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the user’s computer.

·    Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.

·      Intrusion-detection/prevention systems can be used to protect against denial of service attacks. There are other measures too that can be put in place to avoid denial of service attacks.

 

 


 

WRITTEN BY:

UFOT GODSTIME BASSEY

CEO,

TIJAN CONNECT GROUP

Website: www.tijanconnect.com.ng

E-mail: tijanconnectgroup@gmail.com

 

Post a Comment

0 Comments