What Is hacking And Cybercrime
hello views today we will discuss about what is hacking and cybercrime. first we will see what is hacking and types of hacker then we will move to what is cybercrime and types of cybercrime
What is Hacking ?
Hacking is the activity of identifying weakness in a computer system or network to exploit the security to gain access to the personal data or business data.
it is like giving command to your system without your permission.
In local words "dusre ke kandhe pe Banduk rhk ki goli Chalana"
Type of Hacker
Hacker are classify based on their activity the following are few list of hacker
1. White Hat
A Security hacker gain access to the system with a view to fix the identified weakness. they may also perform pain testing and vulnerability assessment.
2. Black Hat
A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
3. Grey Hat
A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
4. Script kiddled
A non-skilled person who gains access to computer systems using already made tools.
5. Hacktivist
A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
6. Phreaker
A hacker who identifies and exploits weaknesses in telephones instead of computers.
Introduction To Cybercrime
Cybercrime is the activity of using computers and networks to perform illegal activities like spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrime hacks are committed through the internet, and some cybercrimes are performed using Mobile phones via SMS and online chatting applications.
Type of Cybercrime
- Computer Fraud: Intentional deception for personal gain via the use of computer systems.
- Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.
- Identity Theft: Stealing personal information from somebody and impersonating that person.
- Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
- Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
- Electronic money laundering: This involves the use of the computer to launder money.
- ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
- Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
- Spam: Sending unauthorized emails. These emails usually contain advertisements.