Who is a hacker????
A hacker is a person who creates and modifies computer software and computer hardware, including computer programming, administration, and security.
In computer programming, a 'hacker' is a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. In computer security, a hacker is a person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker.
Different forms of Attack :-
There are various hacking attacks which are used in breaking system and causing disruption and for damaging services. These attacks can be given briefly as following:
1. Software Theft: Software will be hacked and will be sold later by producing illegal copies without the permisson fo the owner in an unauthorized way.This results in bankruptcy and downfall for companies that spend millions developing and creating the software.
3. Theft of information: All types of information and data are robbed for a particular benefit or self motivation.
4. Denial of service: Hacker will break into a system and disable different operations and cancel all account so that all users won't be able to access their own information.
5. Terrorism: known as information terrorism and occurs when dataflow is disrupted causing the system to break down and stop providing services for a period of time.
Different modes Of Computer And Network Attacks :-
1. Distributed denial of service attacks: that the system crashes or stops working for a period of time due to flood of messages or requests.
2. Trojan horse: It is a destructive software installed in computer systems. It shuts down the system and also allows you to hack other people. It enables others to enter your system without your knowing and it can also introduce viruses into your system.
The term "Trojan Horse" comes from a Greek story of the Trojan War in which the Greeks give a giant wooden horse to their enemies, the Trojans, apparently as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
3. Viruses: It spreads and repeats itself then destroy or attack the system.
4. Websites: Trace your web browser using known security holes and then perform destructive activities.
5. Worms: It used for hacking big systems. It utilises all available resources to create overload to the system and difficulty to function.
No comments:
Post a Comment