Hacking is the act of gaining unauthorized access to a computer system, and can include
viewing or copying data, or even creating new data. Often hacking is understood to be a
way of maliciously disrupting a computer system, copying information, or leaving behind
a virus that destroys data.
There are many different reasons why hacking takes place, and these reasons range from
wanting to disrupt a system due to ideology (so hacking as a means of protesting); wanting
to gain profit for example in order to commit credit card fraud; or simply hacking for the
sake of enjoyment and amusement.
There is some controversy about the definition of the word ‘hacker’ because those that try
to prevent such breaches in security from taking place, or seek to recover lost files, can
also be known as hackers. Thus, some people believe that the correct term for malicious
system security breaches is in fact ‘cracking’ and that ‘hacking’ is the correct word to use
for those who fight against such malicious exploitation of computer weaknesses.
However, in the popular imagination and in general conversation, the word ‘hacker’ is
mainly understood to refer to the ‘bad’ method of breaking through computer security. The
two processes share many common skills, as regardless of motivation (whether to steal or
protect, break in to or save, computer data) the same understanding of computers is
required.
Hacking is more than simply a pastime for those who are interested in technology, and
more than simply an illegal activity used for personal gain and with malicious intent,
although both of these motivations do make up much of hacking activity. In fact, hacking
is its own subculture, and members of the community feel very strongly about their
ideologies, techniques and social relationships in the computer underworld.
There are many hacking groups and conventions, such as SummerCon, DEF CON,
HoHoCon, ShmooCon, BlackHat, Chaos Communication and Hacker Halted, and local
hacking communities take their entries into hacking competitions very seriously.
Unsurprisingly there are also numerous online groups and forums dedicated to the subject
of hacking, and there is certainly a strong community spirit felt by those with similar
hacking ideologies.
Furthermore, hackers are often passionate about literary depictions of the hackingcommunity, and ardently read fictional Cyberpunk and factual hacker magazines.
This book will serve as an introduction to the world of hacking, and will provide insight
into some of the key influences, ideologies, groups, concepts, and techniques of hacking.
The first chapter will consider the beginnings of hacking and the influence of the literary
genre, Cyberpunk. The second chapter will look at the different types of hackers, and draw
a distinction between ethical and unethical hacking. The third chapter will look at the issue
of computer security, which is vital to an understanding of hacking.
The final chapter will provide an overview of the various different techniques for hacking,
including automated and manual approaches as well as the importance of the cyber
confidence trick known as social engineering
viewing or copying data, or even creating new data. Often hacking is understood to be a
way of maliciously disrupting a computer system, copying information, or leaving behind
a virus that destroys data.
There are many different reasons why hacking takes place, and these reasons range from
wanting to disrupt a system due to ideology (so hacking as a means of protesting); wanting
to gain profit for example in order to commit credit card fraud; or simply hacking for the
sake of enjoyment and amusement.
There is some controversy about the definition of the word ‘hacker’ because those that try
to prevent such breaches in security from taking place, or seek to recover lost files, can
also be known as hackers. Thus, some people believe that the correct term for malicious
system security breaches is in fact ‘cracking’ and that ‘hacking’ is the correct word to use
for those who fight against such malicious exploitation of computer weaknesses.
However, in the popular imagination and in general conversation, the word ‘hacker’ is
mainly understood to refer to the ‘bad’ method of breaking through computer security. The
two processes share many common skills, as regardless of motivation (whether to steal or
protect, break in to or save, computer data) the same understanding of computers is
required.
Hacking is more than simply a pastime for those who are interested in technology, and
more than simply an illegal activity used for personal gain and with malicious intent,
although both of these motivations do make up much of hacking activity. In fact, hacking
is its own subculture, and members of the community feel very strongly about their
ideologies, techniques and social relationships in the computer underworld.
There are many hacking groups and conventions, such as SummerCon, DEF CON,
HoHoCon, ShmooCon, BlackHat, Chaos Communication and Hacker Halted, and local
hacking communities take their entries into hacking competitions very seriously.
Unsurprisingly there are also numerous online groups and forums dedicated to the subject
of hacking, and there is certainly a strong community spirit felt by those with similar
hacking ideologies.
Furthermore, hackers are often passionate about literary depictions of the hackingcommunity, and ardently read fictional Cyberpunk and factual hacker magazines.
This book will serve as an introduction to the world of hacking, and will provide insight
into some of the key influences, ideologies, groups, concepts, and techniques of hacking.
The first chapter will consider the beginnings of hacking and the influence of the literary
genre, Cyberpunk. The second chapter will look at the different types of hackers, and draw
a distinction between ethical and unethical hacking. The third chapter will look at the issue
of computer security, which is vital to an understanding of hacking.
The final chapter will provide an overview of the various different techniques for hacking,
including automated and manual approaches as well as the importance of the cyber
confidence trick known as social engineering
No comments:
Post a Comment