Cyber hacking
When we hear the terms "hacking" or "hacker," the image that comes to mind is of a clever individual that is criminal by nature, who assaults other computer systems, ruins them, breaks codes and passwords, sends viruses, and so on. Their mentality is that 'hackers' are computer criminals. They have a highly erroneous perception of the 'Hackers,' and have a very negative attitude toward them.
In this case, the media has incorrectly labelled computer criminals as "hackers." The media has played a significant part in the formation of a negative connotation for the term "hacker." Although the general population may propagate rumors, it is difficult to trust that someone is talking about anything wholly fresh.
However, the phrases "hacker" and "computer criminal" are completely distinct and have nothing to do with each other. They express what they have read and listen to what others have to say. As a result, anytime a cyber-crime was committed through the unauthorized use of other computer systems, the word "hacking" was used to describe the news that was produced and distributed to the public. As a result, we may conclude that people's animosity or unfavorable feelings toward 'hackers' stem from the media.
Now, if these cyber criminals are not hackers, two big questions arise:
1. What is a hacker? And,
2. What are the names of these cyber criminals?
'Hackers,' on the other hand, are highly bright individuals who employ their abilities in a constructive and good manner. They assist the government in safeguarding critical national papers, assist corporations in safeguarding documents and trade secrets, and even assist justice in achieving its goals by extracting electronic evidence. Rather, they are those who assist in the pursuit of cyber criminals.
Now we'll get to the second component, which is what these cyber thieves are called. The correct term for such offenders is 'cracker,' not 'hacker.'
"Traditionally, hackers were computer geeks who understood practically everything about computers and were generally renowned for their vast variety of knowledge," stated Ankit Fadia, a famous master mind of India in the subject of "Hacking."
In view of how the term 'hacking' is often interpreted by individuals, the term 'hacker' may be used to describe all of the following: -
1. Code Hackers - They know all there is to know about computers. They have complete control over the computer and can make it do almost whatever they want.
2. Crackers are those who attempt to get access to computer systems. Their favourite pastime is eluding operating systems and their security. It entails compromising software applications' security.
3. Cyber Punks - They are cryptography's masters.
4. Phreakers - They use their extensive understanding of the Internet and the telecommunications infrastructure to solve problems.
5. Virus Creators - Virus events have resulted in severe and data loss at some point. The loss might be caused by: -
Viruses - A virus is a computer programme that can't attach to a file and reproduce itself. It can target any region, from altering the contents of the file it infiltrates to attempting to crash the computer by exploiting the computer's processing resources.
* Worms - Worms may infiltrate a computer and take its resources in order to proliferate. They utilize the internet to propagate their message. A contemporary example is "Love Bug."
* Trojan horse The Trojan horse is a risky proposition. It pretends to perform one thing but actually does another. It's possible that the system will accept it as one item. Its execution may result in the deployment of a virus, worm, or logic bomb.
* Logic bomb - A logic bomb is an attack that is initiated by a certain event, such as a computer clock reaching a certain time.
Comments
Post a Comment