UNETHICAL HACKING: A BANE TO INFORMATION TECHNOLOGY

“Lack of ethics in a living atmosphere create unethical hackers. Poverty is not an excuse for low moral standards.” ~Kavita G. Khanvilkar

We are living in an era of technological advancement. Almost every other task at hand becomes easy when technology is involved. People of all age prefer to utilize these innovative options to work as well as to spend their leisure time. Usage of mobile phones is a good example of an addictive technology. Also, cyberspace or internet as we call it, has become a center of attention to governments, private sectors and/or individuals.

However, increased dependence on the internet technology is leading towards increase in cyber crimes such as pornography, copyright infringement, financial theft, internet fraud, phishing, cyber warfare, hacking, defamation, cyber stalking, cyber bullying etc. Many a times even cyber experts are unable to resolve the problems that are faced by the end users.

Hacking is an activity where a person gains an unauthorized access to one’s system to have knowledge about the information stored in it. A person who hacks a system is termed as ‘Hacker’. Hackers may do it for their personal interests or the interest of the society at their own will. Hacking is legal if it is done for the interest of the society under the existing laws, but it is illegal if done otherwise.

 

Generally, hacking is classified into two types:

  1. Ethical Hacking or White Hat Hacking and
  2. Unethical Hacking or Black Hat Hacking

There also exists a category of hackers known as Gray Hat Hackers, who fall between these two categories and are non-extremist in usage of their hacking skills for doing either good or bad. As I have mentioned above, Ethical Hacking serves society’s interests while Unethical Hacking falls under the category of cyber crimes. Cyber crimes are done for several reasons from personal grudges and professional rivalries to breaching of national security. HOW UNETHICAL HACKING IS DONE? Unethical Hacking is usually done by applying various modes and tactics. Some of them are:

  1. Social Engineering- A non-technical method of intrusion which mainly involves human interaction and tricking people into breaking normal security procedures.
  2. Network Infrastructure Attacks- A method of hacking into networks and network protocols for example TCP/IP.
  3. Operating System Attacks- A method of hacking into operating systems for example Windows, Unix Linux etc.
  4. Application Attacks- A method of hacking via application software.

TO PREVENT such intrusions is a difficulty faced by technical and non-technical people. Most companies use INFORMATION SECURITY MANAGEMENT SYSTEM to prevent and overcome such situations. Also training is provided with respect to information security in many organizations. Some of the ways to prevent Unethical Hacking are:

  1. Changing passwords often
  2. Configuring Firewalls
  3. Performing Attack and Penetration Tests
  4. Implement and use Password Policies
  5. Using Antivirus Software
  6. Monitoring Network Traffic
  7. Changing Default Passwords on devices
  8. Role Based Access Control
  9. Conduct Vulnerability Assessment Tests
  10. Encryption of Data
  11. Restrict Software Installation
  12. Employee Background Check [for organizations]

“Unethical Hacking is the termite to the confidentiality of your information.” ~Kavita G. Khanvilkar

To conclude, I would like to mention that STAYING AWARE is the only way to protect yourself from being a victim of cyber crimes. WHAT DO YOU THINK?

sign

© 2015 Kavita G. Khanvilkar. All Rights Reserved.

Advertisements

3 thoughts on “UNETHICAL HACKING: A BANE TO INFORMATION TECHNOLOGY

  1. Yoshiko says:

    Thanks for this. I agree poverty is an excuse for hackers to do unethical thing.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s