Communication Technologies - Hacking
Unauthorized access to data in a device, system or network is called hacking. A person hacking another person’s system is called hacker. A hacker is a highly accomplished computer expert who can exploit the smallest of vulnerabilities in your system or network to hack it.
A hacker may hack due to any of the following reasons −
Depending on the application or system being broken into, these are some categories of hacking common in the cyber world −
As iron sharpens iron, hacking counters hacking. Using hacking techniques to identify potential threats to a system or network is called ethical hacking. For a hacking activity to be termed ethical, it must adhere to these criteria −
· Hacker must have written permission to identify potential security threats
· Individual’s or company’s privacy must be maintained
· Possible security breaches discovered must be intimated to the concerned authorities
· At a later date, no one should be able to exploit ethical hacker’s inroads into the network
A term that goes hand in glove with hacking is cracking. Gaining unauthorized access to a system or network with malicious intent is called cracking. Cracking is a crime and it may have devastating impact on its victims. Crackers are criminals and strong cyber laws have been put into place to tackle them.