Hacking and Hacker

Only available on StudyMode
  • Topic: Black hat, Grey hat, White hat
  • Pages : 5 (1666 words )
  • Download(s) : 318
  • Published : April 26, 2013
Open Document
Text Preview
Table of content

1. Introduction ………………………………………………………………………….2

2. Purpose of Hacking…………………….…………………………………………...2

3. Types of Hacker and Hacking………………………………………..…………….3

4. Ethical Hacking………………………………………..……………………………..4

5. Effect of Hacking…………………….……………………………………………….5

6. Benefit of hacking……………………………………….…………………………...5 7. Conclusion…………………………………………………………………………….6

8. References…………………………………………………………………………….7

Hacking is to change computer hardware or software, in order to cause damage to important data on a computer or to simply steal personal information. Computer hackers take help of internet because internet connects the entire computer around the world. A person who attacks to another system with the intent to cause harm, without having any permission from the system owner is called as hacker. There are different types of hacker with different purpose of hacking. Hacking is illegal thing which have lots of effect but somehow hacking is good because it got some benefit. In the following paragraph I am going to discuss about types of hacker, purpose of hacking, effect of hacking, benefit of hacking and ethical hacking. (Beaver & McClure, 2007) Few years ago only selected people know about computer but nowadays even 13 year old kids know how to hack computer. People hack computer and computer network for different purposes. The main reason of hacking computer is for money and to retrieve important information. Generally people hack someone bank detail and steal the money, some people hack database of some network and sell it example people hack expensive games for Xbox, ps3, lots of movies, exam question paper and other different things to earn money. Few people do hacking just for fun and curiosity just to judge how perfect they are in computer. Either to impress friends has fun and learns the basics of hacking or gain recognition in computer-enthusiast group. Some people just show off their talent by hacking computer program. I have seen lots of people who hack computer system just to show it to other people. Hacking become biggest problem so company hired a hacker just to hack their own network security and check it weather it is secured or not that’s the only legal hacking in the computer world only the good hacker check the network security and maintain the security system of the company. (DR,k.& Paul, 2002) There are different types of hacker who are differentiate into two different category legal (good) hacker and illegal (bad) hacker. First we are going to talk about all bad hacker who are known as black hat hacker, spy hacker, cyber terrorist and hacktivists. Black hat hackers are those who are referred as plain hacker this hacker normally break computer network and create computer viruses. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid.  Some hacker activists are motivated by politics or religion, while others may wish to expose wrong doing, or exact revenge, or simply harass their target for their own entertainment are called hacktivists hacker. Spy hackers are from Corporations hire hackers to insinuate the opposition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid. Cyber terrorist are most dangerous hacker among the bad hacker they are motivated by some politicians and religion, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder. White hacker which are only one good hacker in this world. These hackers believe that users need education and protection from data loss. White hat hackers usually play in the field of black hat hacking, but they do not deface or steal information. Instead, they will notify the...
tracking img