Sunday 12 July 2009

Group 5 Task 2: Hacking

Group 5 members:
Akinloye Temitope .A
Abubakar Musa Shinkafi
Oni Adeboye .A
Satish Kumar Kakollu
Udaykiran Ashokpao Phulapi


White hacking is defined as hacking that identifies a security weakness in a computer or networks but instead of taking malicious advantage of it, exposes the weakness the way that will allow system owners to fix the breach before it can be taken advantage by others. ‘White hackers’ are also known as ethical hackers, such people are employed by companies where sometimes these professionals are called “sneakers”, group of theses are often called tiger teams or red teams. The ethical hackers use a variety of methods to carry out their test including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry in to secured areas.

White hacking is a hobby for some, others provide their services for fee, and some of them work as consultants, interestingly white hackers are former black hackers but that is where the problem with white hacking is because hackers and hacker group fight, they insult each other in public, additionally it was claimed that some of them proclaimed being a white hackers but they end up participating in unethical behaviour perhaps the lower key crime of using a calling card for fee calls through refraining the more serious crime of credit card.


The grey hacking is combination of both white and black hacking in this there will be two set of hackers one of them are un trusted external hackers and the other are trusted internal hackers who will help the external hackers .the outside attacker will try to create a black box and the insider will provide the important information to the outsider.


Black hat hackers or crackers are those that use their skills and knowledge in programming and computer networking to break into computer systems illegally and either cause damage or steal sensitive information. Black hat hackers find fun in developing viruses to infect and cause damage to so many people for the sake of it. There are a couple of interesting hacking cases that have occurred over the few years. One of the most popular cases in hacking history is that of Jonathan James who hacked into high profile organisations such as NASA and an agency of the Department of Defence at the age of 16. He was sentenced by the law. He was released 6months later and he now plans to start his own computer security outfit.

No comments: