Hacking is any technical effort to manipulate the normal behavior of
network connections and connected systems. A hacker is any person
engaged in hacking. The term hacking historically referred to
constructive, clever technical work that was not necessarily related to
computer systems. Today, however, hacking and hackers are most commonly
associated with malicious programming attacks on networks and computers
over the internet.
Origins of Hacking
M.I.T.
engineers in the 1950s and 1960s first popularized the term
and concept of hacking. Starting at the model train club and later in
the mainframe computer rooms, the hacks perpetrated by these hackers
were intended to be harmless technical experiments and fun learning
activities.
Later, outside of M.I.T., others began applying the term to less
honorable pursuits. Before the internet became popular, for example,
several hackers in the U.S. experimented with methods to illegally
modify telephones so they could make free long-distance calls over the
phone network.
As computer networking and the internet exploded in popularity, data
networks became by far the most common target of hackers and hacking.
Common Network Hacking Techniques
Hacking on computer networks is often done through scripts and other
network software. These specially-designed software programs generally
manipulate data passing through a network connection in ways designed to
obtain more information about how the target system works. Many such
pre-packaged scripts are posted on the internet for anyone — typically
entry-level hackers — to use. Advanced hackers may study and modify
these scripts to develop new methods. A few highly skilled hackers work
for commercial firms, hired to protect that companies' software and data from outside hacking.
Cracking techniques on networks include creating worms, initiating denial of service (DoS) attacks, and establishing unauthorized remote access connections to a device. Protecting a network and the computers attached to it from malware, phishing, Trojans, and unauthorized access is a full-time job and vitally important.
Cracking techniques on networks include creating worms, initiating denial of service (DoS) attacks, and establishing unauthorized remote access connections to a device. Protecting a network and the computers attached to it from malware, phishing, Trojans, and unauthorized access is a full-time job and vitally important.
Hacking vs. Cracking
While true hacking once applied only to activities having good
intentions, and malicious attacks on computer networks were officially
known as cracking, most people no longer make this distinction. It is
extremely common to see the term hack used to refer to activities once
known only as cracks.
Cybersecurity is an important career choice
as our economy is increasingly based on internet access. Cybersecurity
experts work to identify malicious code and prevent hackers from
accessing networks and computers.
Comments
Post a Comment