Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings. Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks. People with malevolent intent are often referred to as "crackers"--as in "cracking" into computers. Source:
ncsl.org Hacking the power grid made front-page headlines in September when CNN aired a video showing an Idaho National Laboratory demonstration of a software attack on the computer system used to control a power generator. In the demonstration, the smoking generator was rendered inoperable. Source:
ztruth.typepad.com At least 155 federal computer systems -- some containing sensitive research information or personal data on Americans -- were temporarily taken over by hackers last year, according to a government review. The report found numerous weaknesses that permitted unauthorized access to the medical information of Medicare recipients. Director of the FBI's National Infrastructure Protection Center, said there are currently 102 open investigations of computer intrusions into government systems, and the bureau is keenly aware of the rise of state-sponsored hacking. Only 5 to 10 percent of federal agencies use automatic security detection programs and 80 percent of incidents go unreported. The government's lack of safeguards against domestic and foreign attackers who struck 32 federal agencies last year is "chilling," one congresswoman said. Source:
addsecure.net A certified ethical hacker primarily evaluates the security of a computer system or network by simulating an attack by a malicious hacker. The process involves an active analysis of the system for weaknesses, technical flaws or vulnerabilities. Source:
informatics.edu.ph The currently accepted view of a hacker is someone who uses a specialized knowledge of computer systems to obtain illegal access to them. Probably, too, once they have obtained access to a system, a hacker would be expected to steal and corrupt data (Langford 1995). Source:
cs.mdx.ac.uk
No comments:
Post a Comment