What is Hacking?

Hacking is an atempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

Description: To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

Related Defintions

  • Secure Sockets Layer (ssl)

    Secure Sockets Layer (SSL) is a protocol developed by Netscape for establishing an encrypted link be

  • Cross-site Scripting

    Cross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost

  • Dns Spoofing

    DNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website dis

  • Ciphertext

    Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output

  • Computer Worm

    A computer worm is a malicious, self-replicating software program (popularly termed as 'malware') wh

  • Computer Virus

    A computer virus is a malicious software program loaded onto a user’s computer without the user’s kn

  • Denial-of-service Attack

    Denial-Of-Service (DoS) is an attack targeted at depriving legitimate users from online services. It

  • Memory Corruption

    Memory corruption can be described as the vulnerability that may occur in a computer system when its

  • Trojan

    Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that

  • Authentication

    Authentication is the process of recognizing a user’s identity. It is the mechanism of associating a

Comments

Popular posts from this blog

What is Protocol? What is TCP/IP, FTP, HTTP, GOPHER, TELNET, SMTP, ETHERNET?

What is OSI Model in networking?