Monday 10 August 2009

Group 9 Task 2: Hacking

Group 9
DILIP KUMAR VOLAM
RAVI KANTH SAMA
RAJASHEKAR MUSKU
RAGHUMA REDDY VAKITI



Hacking :
Hacking use of computer and networking resources. Hacking often is based on software bugs that a hacker can use to give him or her super user status. Hacking is a process of improving knowledge without any permission of users either it may be computer or computer network. Hacking is the breach of security system, usually pertains to someone gaining access to servers or database of any users. Hacking has taken a bit of a negative connotation, concerning people using backdoors, Trojans, etc. Hacker is a person who specializes in work with the security mechanisms form computer and network systems.

Types of hackers attack:
1. Viruses – most common form of attack
2. Denial of service attacks
3. Trojans
4. Brute force and social engineering password attacks
5. Port scanning and spoofing
6. Phishing
7. Ransomware

Effects of Hacking:
Computer hacking is a breach of computer security. Hackers may even delete sensitive information on gaining access to it. Delete or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking. A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer. Manipulation of sensitive user data is a grave consequence of hacking. Hacking can be used to convert computers into zombies that is internet enabled computers that are compromised by hackers or computer viruses. Some hackers are not harmful; they just want to prove themselves or to prove a point, but they won’t steal or destroy anything. Others are extremely dangerous they hack system even if it is bank, or online job, they might stealing money, credit card numbers, accounts.

1 comment:

Smith said...

Hey thanks a lot for sharing such nice and informative information, Good Description about Ethical Hacking. The most interesting job in the field of computers is being an Ethical Hacker; this course has a vast demand now. By the way check out the Professional Training and Certification for Ethical Hacker from EC-Council here http://www.eccouncil.org/certification/certified_ethical_hacker.aspx