Introduction to Hacking



In this article, I will be explain most of the things you'll need to know to be a hacker and what's it really all about. But before I proceed, this article is for EDUCATIONAL PURPOSE ONLY, whatever you do with it after this, you are on your own.

A computer is a device that can be instructed to carry out an arbitrary set of arithmetic or logical operations automatically. The Internet is run on computers and it connects millions of other computers and here is where we come.


Hacking is identifying weakness or finding vulnerable in computer/smart systems networks and exploiting this found weakness to gain access to the system. The name of the people who do this is called Hackers.

Types of hackers
A hacker is any skilled computer expert that is capable of breaking into any computer systems and networks using bugs and exploits.
Hackers are classified based on their intent.
1) White hat Hackers (Ethical Hacker)
2) Black hat Hackers (Crakers)
3) Grey hat Hackers (Ethical/Crackers)
4) Hacktivist
5) Phreakers

WHEN HACKING BECOMES A CRIME:- CYBER CRIME
Cybercrime is a Offence that is committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)" cc: Wikipedia

Common types of Cyber crimes
Computer Fraud:
1)Altering in an unauthorized way
2)Altering, destroying and stealing of datas
examples includes including bank fraud, carding, identity theft, extortion, and theft of classified information.

Cyber terrorism:
Cyberterrorism in general is an act of terrorism committed through the use of cyberspace or computer resources
examples are hacking of information servers during a political election

Cyberextortion:
Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection".

And here is where the reliever comes in; Ethical Hacking

What is ethical hacking?

Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules.

Get written permission from the owner of the computer system and/or computer network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the computer system to the organization.
Inform hardware and software vendors of the identified weaknesses.

Legality of ethical hacking

Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.
Summary

Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
Cybercrime is committing crime with the aid of computers and information technology infrastructure.
Ethical hacking is about improving the security of computer systems and/or computer networks.
Ethical hacking is legal.


Terminologies and Meaning
Bug: A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made in either a program's source code or its design, or in components and operating systems used by such programs.

Exploit: is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). 



Don't forget to share this post via share buttons below, for the benefit of others. Kindly use the comment box below for any questions and suggestions.

Comments