Friday, September 21, 2018

Hacking

Hacking


What is Hacking?


Hacking -  refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.

Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer.

A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem.

Types of Hackers


Black hats - hack to take control over the system for personal gains.

White hats - professionals who hack to check security systems to make it more hack-proof. This process is typically referred to as penetration testing.

Grey hats - differ from black hats in the sense that they notify the admin of the network system about the weaknesses discovered in the system instead of exploiting for personal gains.

Ethical hacker - is an individual hired to hack into a system to identify and repair potential vulnerabilities

Script kiddies - or skids are people breaking into computers using programs written by others, with very little knowledge about the way they work.

Blue hats - hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed.

Crackers - find exploits for system vulnerabilities and often use them to their advantage by either selling the fix to the system owner or selling the exploit to other black hat hackers

Hacktivist - is someone who uses their hacking skills for political ends.

Red team - an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.

Green hats - are the amateurs in the online world of hacking.

Cracking is a method by which a person who gains unauthorized access to a computer with the intention of causing damage.

Hacking and Cracking is a crime when the perpetrators access systems without the owner's permission.






No comments:

Post a Comment