CYBER WAR What is Cyber War? Cyber war in simple term means the use of computer technology to disrupt the activities of a state or organization by disabling financial and organizational systems by stealing or altering classified data to undermine networks, websites and services via the Internet through computer viruses, Denial-of-Service attacks, etc. Cyber war is a virtual conflict initiated as a political attack on the enemy’s computer and information system. Cyber war is also known as ‘Cyber Warfare’. These attacks are committed by so called ‘Cyber Warriors’, who are individual with high level of technical skill, paid by a State to commit acts of cyber warfare.
Also governments are in the scope of some hacker protester groups such as RedHack in Turkey and Anonymous. These hackers groups had hacked some of the governments systems and stole data as a protest. To conclude, in the world we live in computers, mobile phones, TV’s, network connections are in everywhere. These beautiful technology products threats privacy of the data. Hackers could easily own our private data by hacking but on the other hand hacking is an excellent way to find & fix vulnerabilities and build stronger defense systems.
Computer crime is defined as "a criminal act that has been committed. With a computer as the principle tool"(Judson, 30). These computer criminals are people with advanced knowledge of operating systems, phone systems, and other computer related devices. Some computer criminals break into other people’s computers, and steal data, these criminals are known as hackers. Yet others might make a phone call without even paying for it, or receive phone services that they did not pay for, these people are known as phreakers.
If someone was on bad terms with a business or website, anything, the person doing the crime would take over or destroy their website. Currently in todays world, cyber crime criminals want to use your computer for illegal activity, to steal your profit. Cybercriminals utilize many websites to develop “crimeware”, like viruses, trojans, and keyloggers, so other criminals can pick up on their own wicked ways. Most of the crimeware doesn’t act as a command, but as a data supplier. A data supplier can steal private information from anyones computer, which then can be used and seen by any cybercriminal.
Syntactic hacking attack is when a hacker has a malicious intent to hack into one’s system by using viruses and worms (Bhardwaj and Singh). Viruses are programs that replicate themselves and attach to other programs (Gangradeen). However, worms are running programs that duplicate over networks using procedure (Gangradeen). Many people and firms are at risk of being hacked. There have been instances where people have used their hacking skills to commit crimes such stealing classified information (Thomas).
Policeweblab.com virus Policeweblab.com virus is termed as a dangerous threat which targets poorly protected computers to accomplish its vicious task. The virus is capable of blocking access to internet, disabling system programs and rendering computer useless. The destructive program cunningly disguises as a legal enforcement institution to scare PC users in an attempt to steal money from them. The virus is categorized as ransomware because it uses dirty tricks to extort ransom. This virus invades a targeted PC with the help of Trojan.
Hacking activities expose confidential user information like personal details, social security numbers, credit card numbers, bank account data, and personal photographs. User information, in the hands of computer hackers, makes it vulnerable to illegitimate use and manipulation. Identity theft is another important consequence of computer hacking. This causes fraud. Hacking can even risk national sercurity.
Colored HATS IN NETWORK SECURITY In Computer security terminology Hacker is a person or group of persons, who exploit, modify and identify weakness in a computer system or network. Hacker may be motivates of reasons such as profit, protest and challenge. based on attitude, belief, and goals hacker groups are categories such as Black hat White hat Grey hat Blue hat Black hat: Black hat are the "hackers" which means they intentionally sent a malicious code into the computer system or network. black hat hackers are violate the rules of computer security. black hat hackers hack the system without authorization and destroy files or steal data for their purposes.
On the other hand hackers are an essential help when we are in trouble and someone needs to find info inside a cellphone to try and help if someone is missing. There are two kinds of hackers; the most familiar is described as a criminal, dangerous and devious. The other kind is not as familiar and behaves in more ethical ways. Background A hacker is defined as a computer enthusiast or a microcomputer user who attempts to gain unauthorized access to proprietary computer systems (dictionary.com). Another definition found Criminal Hacking Criminal Hackers terrorize the world using their computer skills to make viruses that can damage a computer.
This may range from an employee using the database for personal activities to gaining access to a bank system and completing an unauthorized transfer Human threats are perpetrated by a person or groups of people who attempt to penetrate computer systems through computer networks, public switched telephone networks or other sources. These attacks generally attack known security vulnerabilities of systems. These vulnerabilities are mainly due to software configuration errors. Methods used by hackers to gain unauthorised acces... ... middle of paper ... ...vity. Society is still seeing the infancy of computers, not just in its general growth, but in its capabilities of controlling every facet of our normal lives.