Common Hacking Terminologies
Ø
What is Cyber Crime?
Ø Types of
Cyber Crime
Ø What is
Ethical Hacking?
Ø Why Ethical
Hacking?
Ø Legality of
Ethical Hacking
Ø Skills
Required to Become an Ethical Hacker
Ø What is a
programming language?
Ø
Summary
INTRODUCTION
OF CYBER CRIME
Computers
have become mandatory to run a successful business. It is not enough to have
isolated computers systems; they need to be networked to facilitate
communication with external businesses.
This exposes
them to the outside world and hacking.
Hacking
means using computers to commit fraudulent acts such as fraud, privacy
invasion, stealing corporate/personal data, etc.
Cybercrime
cost many organizations millions of dollars every year. Businesses need to
protect themselves against such attacks.
What is Cyber crime?
Cybercrime
is the use of computers and networks to perform illegal activities such as
spreading computer viruses, online bullying, performing unauthorized electronic
fund transfers, etc.
Most
cybercrimes are committed through the internet.
Some
cybercrimes can also be carried out using Mobile phones via SMS and online
chatting applications.
Type of Cybercrime
The
following list presents the common types of cybercrimes:
1. COMPUTER FRAUD: Intentional deception for personal gain via
the use of computer systems.
2. PRIVACY VIOLATION: Exposing personal information such as email
addresses, phone number, and account details, etc. on social media, websites,
etc.
3. IDENTITY THEFT: Stealing personal information from somebody
and impersonating that person.
4. SHARING COPYRIGHTED FILES/INFORMATION: This
involves distributing copyright protected files such as eBooks and computer
programs etc.
5. ELECTRONIC FUNDS TRANSFER: This involves gaining an un-authorized access
to bank computer networks and making illegal fund transfers.
6. ELECTRONIC MONEY LAUNDERING: This involves the use of the
computer to launder money.
7. ATM FRAUD: This involves intercepting ATM card details such as account number
and PIN numbers. These details are then used to withdraw funds from the
intercepted accounts.
8. DENIAL OF SERVICE ATTACKS: This involves the use of computers in
multiple locations to attack servers with a view of shutting them down.
9. SPAM: Sending unauthorized emails. These emails usually contain
advertisements.
What is Ethical Hacking?
Ethical
Hacking is identifying weakness in computer systems and/or computer networks
and coming with countermeasures that protect the weaknesses. Ethical hackers
must abide by the following rules.
Ø Get written
permission from the owner of the computer system and/or computer network before
hacking.
Ø Protect the
privacy of the organization been hacked.
Ø Transparently
report all the identified weaknesses in the computer system to the
organization.
Ø Inform
hardware and software vendors of the identified weaknesses.
Legality of Ethical Hacking
Ethical
Hacking is legal if the hacker abides by the rules stipulated in the above
section on the definition of ethical hacking.
Skills Required to Become aN Ethical Hacker
Skills allow
you to achieve your desired goals within the available time and resources.
As a hacker,
you will need to develop skills that will help you get the job done.
These skills
include learning how to program, use the internet, good at solving problems,
and taking advantage of existing security tools.
What is a programming language?
A
programming language is a language that is used to develop computer programs.
The programs developed can range from operating systems; data based
applications through to networking solutions.
Why should you learn how to program?
Hackers are
the problem solver and tool builders, learning how to program will help you
implement solutions to problems. It also differentiates you from “Script Kiddies”.
Writing
programs as a hacker will help you to automate many tasks which would usually
take lots of time to complete.
Writing
programs can also help you identify and exploit programming errors in
applications that you will be targeting.
You don’t
have to reinvent the wheel all the time, and there are a number of open source
programs that are readily useable.
You can
customize the already existing applications and add your methods to suit your
needs.
OTHER SKILLS
In addition
to programming skills, a good hacker should also have the following skills:
Know how to
use the internet and search engines effectively to gather information.
Get a
Linux-based operating system and the know the basics commands that every Linux
user should know.
Practice
makes perfect, a good hacker should be hard working and positively contribute
to the hacker community.
He/she can
contribute by developing open source programs, answering questions in hacking
forums, etc.
SUMMARY
· Hacking is identifying and exploiting weaknesses in computer
systems and/or computer networks.
· Cybercrime is committing a crime with the aid of computers and
information technology infrastructure.
· Ethical Hacking is about improving the security of computer
systems and/or computer networks.
·
Ethical Hacking is legal
The common computer system threats and how you can protect systems
against them.
·
Topics covered in this lesson
·
What is a Security Threat?
·
What are Physical Threats?
·
What are Non-physical Threats?
A computer
system threat is anything that leads to loss or corruption of data or physical
damage to the hardware and/or infrastructure.
Knowing how
to identify computer security threats is the first step in protecting computer
systems.
The threats
could be intentional, accidental or caused by natural disasters.
What is a Security Threat?
Security
Threat is defined as a risk that which can potentially harm computer systems
and organization.
The cause
could be physical such as someone stealing a computer that contains vital data.
The cause
could also be non-physical such as a virus attack.
In this
class, we will define a threat as a potential attack from a hacker that can
allow them to gain unauthorized access to a computer system.
WHAT ARE PHYSICAL THREATS?
A physical
threat is a potential cause of an incident that may result in loss or physical
damage to the computer systems.
The
following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the
rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
HUMAN: These threats include theft, vandalism of the infrastructure
and/or hardware, disruption, accidental or intentional errors.
To protect
computer systems from the above mentioned physical threats, an individual must
have physical security control measures.
The following
list shows some of the possible measures that can be taken:
INTERNAL: Fire threats could be prevented by the use of automatic fire
detectors and extinguishers that do not use water to put out a fire. The
unstable power supply can be prevented by the use of voltage controllers. An
air conditioner can be used to control the humidity in the computer room.
External: Lightning protection systems can be used to protect computer
systems against such attacks. Lightning protection systems are not 100% perfect,
but to a certain extent, they reduce the chances of Lightning causing damage.
Housing computer systems in high lands are one of the possible ways of
protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and
restricted access to computer rooms.
WHAT ARE NON-PHYSICAL THREATS?
A
non-physical threat is a potential cause of an incident that may result in loss
or corruption of system data.
Disrupt
business operations that rely on computer systems.
Loss of sensitive
information.
Illegal
monitoring of activities on computer systems.
The
non-physical threats are also known as logical threats. The following list is
the common types of non-physical threats:
·
Virus
·
Trojans
·
Worms
·
Spyware
·
Key loggers
·
Adware
·
Denial of Service Attacks
·
Distributed Denial of Service Attacks
·
Unauthorized access to computer systems resources such as data
·
Phishing
OTHER COMPUTER SECURITY RISKS
To protect
computer systems from the above-mentioned threats, an individual must have
logical security measures in place.
The following list shows some of the possible measures that can be
taken to protect cyber security threats
· To protect against viruses, Trojans, worms, etc. an individual can
use anti-virus software. In additional to the anti-virus software, an
organization/individual can also have control measures on the usage of external
storage devices and visiting the website that is most likely to download
unauthorized programs onto the user’s computer.
· Unauthorized access to computer system resources can be prevented
by the use of authentication methods. The authentication methods can be, in the
form of user ids and strong passwords, smart cards or biometric, etc.
· Intrusion-detection/prevention systems can be used to protect
against denial of service attacks. There are other measures too that can be put
in place to avoid denial of service attacks.
WRITTEN BY:
UFOT
GODSTIME BASSEY
CEO,
TIJAN
CONNECT GROUP
Website: www.tijanconnect.com.ng
E-mail: tijanconnectgroup@gmail.com
0 Comments
Your comments are secured with us!