Sunday 12 July 2009

Group 18 Task 2: Hacking

GROUP 18
MANI KIRAN CHOWDARY KATRAGADDA
KOTESWARA RAO UMMANENI
PRAMOD BELLAMKONDA
VENKATA SATISH ANNE
RAVICHANDRA PERNA


OVERVIEW
An invasion can be defined as an attempt to break into or misuse a computer system. The word "misuse" is broad, and can mean something as severe as stealing confidential data, or something as minor as misusing your email system for spam. Today, both the Internet and corporate intranets are simply creeping with people from all walks of life who are continuously trying to test the security of various systems and networks. In any event, no intrusion is innocent and no intrusion is benign. There is no barrier or bridge available out there that will totally protect our networks and systems. The only thing we can do as IT professionals is to make sure that all of the possible means were blocked, that the alarm is turned on. The primary focus is to train IT professionals or the end-users who is exactly being affected by hackers by establishing security guideline. And the need has been extended even to a great extent for not only to IT users as well as to uneducated users also.

WHAT IS A HACKER
The word hacker is used in popular media to express somebody who attempts to break into computer systems. A person who practices hacking is called a hacker. Normally, this type of hacker would be an expert programmer or engineer with sufficient technical knowledge to understand the weak points in a security system. And also someone who is really good at what he does with computers is called a hacker. A hack, in software circles, is a quickly written short piece of code that makes something work. It may not be stunning to look at, but it make things function. Hacking can be just to find out how it works without criminal intent. Hacking can be simply to crack a code, a hacker can be breaking into a computer that's yours or often not wanted. Originally Hacking had nothing to do with breaking into one another's computers. It was primarily tinkering away with hardware to make things work. And this damage of hackers is silent expose around in very big amount.

HACKER ETHICS
The original Hacker Ethic was sort of an impromptu, informal ethical code developed by the original hackers of MIT and Stanford (SAIL) in the 50s and 60s. These "hackers" were the first generation of programmers, employing time-sharing terminal access to 'dumb' mainframes, and they often confronted various sorts of bureaucratic interference that prevented them from exploring fully how technological systems worked. The ethic reflects their resistance to these obstacles, and their ideology of the libratory power of technology. Violating some ethical codes can get you banned from the profession or worse, when professional associations exist to enforce the regulations; with hackers, breaking the Hacker.

CONCLUSION

We have seen many new issues that come across day to day life quite often. The only means that an IT professional can improve security by increasing means of security constraints on a daily basis. However, all the hard work and money spent on the best security tools available doesn’t do any good if users don’t do minimal things such as securing passwords and locking down workstations when they leave at night. It is therefore our responsibility as IT security professionals to educate these users to the best of our ability, thus ensuring that IT security is being used even when nobody is watching. Hopefully, this paper will make less educated users think about everything they do, and impress upon them the need to consider security in their everyday practices.

No comments: