Hacking
Hacking
Hacking
Before we go any further, let’s look at some of the most commonly used
terminologies in the world of hacking.
Hackers are classified according to the intent of their actions. The following list
classifies hackers according to their intent.
Symbol Description
What is Cybercrime?
Cyber crime is the use of computers and networks to perform illegal activities
such as spreading computer viruses, online bullying, performing unauthorized
electronic fund transfers, etc. Most cybercrimes are committed through the
internet. Some cybercrimes can also be carried out using Mobile phones via SMS
and online chatting applications.
Type of Cybercrime
The following list presents the common types of cybercrimes:
Computer Fraud: Intentional deception for personal gain via the use of
computer systems.
Privacy violation: Exposing personal information such as email addresses,
phone number, account details, etc. on social media, websites, etc.
Identity Theft: Stealing personal information from somebody and
impersonating that person.
Sharing copyrighted files/information: This involves distributing copyright
protected files such as eBooks and computer programs etc.
Electronic funds transfer: This involves gaining an un-authorized access to
bank computer networks and making illegal fund transfers.
Electronic money laundering: This involves the use of the computer to
launder money.
ATM Fraud: This involves intercepting ATM card details such as account
number and PIN numbers. These details are then used to withdraw funds
from the intercepted accounts.
Denial of Service Attacks: This involves the use of computers in multiple
locations to attack servers with a view of shutting them down.
Spam: Sending unauthorized emails. These emails usually contain
advertisements.
Get written permission from the owner of the computer system and/or
computer network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the computer system
to the organization.
Inform hardware and software vendors of the identified weaknesses.
Summary
Hacking is identifying and exploiting weaknesses in computer systems
and/or computer networks.
Cybercrime is committing a crime with the aid of computers and
information technology infrastructure.
Ethical Hacking is about improving the security of computer systems
and/or computer networks.
Ethical Hacking is legal.
Next
Netsparker, the developers of Proof Based Scanning technology, have sponsored the Guru99
project to help raise web application security awareness and allow more developers to learn
about writing secure code
VISIT THE NETSPARKER WEBSITE