Hacking refers to attempts to gain information from otherwise undisclosed areas. Hacking
is the most commonly known computer crime, however, people refer to
hacking as committing any criminal act using a computer while this is
not the case. Hacking is similar to breaking and entering however
instead of breaking into a house you break some one's computer security
and entering is similar to accessing someone's computer files, once in,
they steal your files and use them for personal befit. While it is not a
prerequisite most hackers are also virus creators. There are two types
of hackers black hat hackers and white hat hackers, black hat hackers are the ones who are there for malicious purposes such as stealing, storing or vandalizing data. While white hat hackers are legally intruded who are hired by administrators to test the system
for security flaws. There are also many other variants such as gray hat
hackers which is between black hat and white hat hackers.
Software piracy
Software piracy means denial of intellectual property rights to the software creator or developer. It is not ethical to use someone else's property without his/her content and without giving him/her the benefit of it. Developing a software application involves a major investment of time, money and effort. Software piracy denies the creator the revenue he/she deserves and harms paying customers, who ultimately bear the cost of illegal use of products. Piracy limits the creator's ability to be competitive, leading to higher-priced, less advanced products for customers.
Getting protected
There are other forms of attacks also such a sniffing, packet forge spoofing, IP spoofing etc. But we are not discussing them as in order to understand these, one needs to know the working of networks.
Protective measures
Now after knowing different forms of attacks, let us now discuss different protective measures that may be taken against such attacks.
The entire computer security is based on a system of safeguards that are designed to protect a computer system from deliberate or accidental access and/or damage by unauthorized persons.
The combination of identification, authentication, and authorization can control access to a system. This combination is very useful, especially in network security. Various techniques used for network security are .......
1.Authorization: Authorization is performed by asking the user a legal log in id. If the user is able to provide a legal log in id, he/she is considered an authorized user.
2.Authentication: Authentication is also termed as password protection as the authorized user is asked to provide a valid password and if he/she is able to do this, he/she is considered to be an authentic user.
3.Firewall: A system designed to prevent unauthorized access to or from a private network is called Firewall. Firewalls are a mechanism to prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets.
Securing Data
Though controlled access to a system indirectly secures data, yet there are some other measures that must be taken in case data gets corrupted even after taking security measures. These include taking backups from time to time, preparing recovery mechanism, maintaining transaction logs and having a proper disaster recovery plan. Data security also involves measures like a secured waste, effective passwords, internal controls, conducting audits, and using cryptography.
Computer crime
Computer crime or the electronic crime may include thefts or actions in the electronic form that causes damage or difficulty to other computer users. Computer crime may be of following types ......
- Theft of computer time.
- Theft, destruction or alteration of data.
- Theft, destruction or manipulation of programs.
- Hacking.
Some white-collar crimes are
- Theft of data or software.
- Theft of documentation.
- Sabotage.
- Illegal modification of data.
- Forging or falsification of data.
- Embezzling funds.
- Fraud in figures.
- Installing 'Bugs'.
- Selling reports, paper output.
Reasons for computer crimes
- Little understood by police, courts.
- Low detection rate, often accidental.
- 3-defined laws.
- Data 'value' hard to define.