During the 1960s, the word "hacker" grew to prominence describing a person with strong computer skills, an extensive understanding of how computer programs worked, and a driving curiosity about computer systems. Hacking, however, soon became nearly synonymous with illegal activity. While the first incidents of hacking dealt with breaking into phone systems, hackers also began diving into computer systems as technology advanced.
Hacking became increasingly problematic during the 1980s. As a result, the Computer Fraud and Abuse Act were created, imposing more severe punishments for those caught abusing computer systems. In the early 1980s, the Federal Bureau of Investigation (FBI) made one of its first arrests related to hacking. A Milwaukee-based group known as the 414s was accused of breaking into 60 different computer systems including the Memorial Sloan-Kettering Cancer Center and the Los Alamos National Laboratory. Later that decade, the infamous Kevin Mitnick was arrested and sentenced to one year in jail for damaging computers and stealing software. He was arrested again in 1995 for computer fraud and put in jail for hacking Motorola Inc., Sun Microsystems Inc., NEC Corp., and Novell Inc. to steal software, product plans, and data. Mitnick eventually cost the firms a total of roughly $80 million.
What is hacking?
Hacking became increasingly problematic during the 1980s. As a result, the Computer Fraud and Abuse Act were created, imposing more severe punishments for those caught abusing computer systems. In the early 1980s, the Federal Bureau of Investigation (FBI) made one of its first arrests related to hacking. A Milwaukee-based group known as the 414s was accused of breaking into 60 different computer systems including the Memorial Sloan-Kettering Cancer Center and the Los Alamos National Laboratory. Later that decade, the infamous Kevin Mitnick was arrested and sentenced to one year in jail for damaging computers and stealing software. He was arrested again in 1995 for computer fraud and put in jail for hacking Motorola Inc., Sun Microsystems Inc., NEC Corp., and Novell Inc. to steal software, product plans, and data. Mitnick eventually cost the firms a total of roughly $80 million.
What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.
Types of Computer Hackers
There are various types of computer hackers that all have different malicious intent. It's important to know these different types of hackers so you can properly defend your data.
The term hacker is a generic term to describe attackers. Not all have intent to steal your data. Below is a list of various types of hackers.
White hat has the skills to break into computer systems and do damage. However, they use their skills to help organizations. For example a white hat might work for an organization to test for security weaknesses and vulnerabilities in the network.
Black Hat also known as a cracker uses his skills to break into computer systems for unethical reasons. For example, steal user data like, username and password, credit card numbers, bank information.
This type can be thought of as a white hat attacker who sometimes acts unethically. They could be employed as a legit network security administrator. But, during this person's duties, he may find an opportunity for gaining access to company data and stealing that data.
A phreaker is simply a hacker of telecommunications. An example of this is tricking the phone system into letting you make free long distance calls.
A Script Kiddy is someone who lacks the skills of a typical hacker. They rely on downloading hacking programs or utilities sometimes calls scripts to perform an attack.
This is a person with political motivations, such as someone defacing a website and leaving messages on the hacked site for the world to see.
This is someone who knows the technical aspects of computer networking and security. This person could attack a network protected by a firewall or IPS by fragmenting packets.
This type is typically an employee or studentat an institution of higher education. They would use the institutions computing resources to write malicious programs.
This is someone that tends to focus more on home computing. Such as, modifying existing hardware or software, use software without a license, unlock Apple iPhone.
0 komentar:
Posting Komentar
Click to see the code!
To insert emoticon you must added at least one space before the code.