Friday, March 29, 2013

Hackers and Internet Security

The idea that there are now so many viruses on the Internet that can be unwittingly downloaded is slightly disturbing, to say the least. With all the malware floating around on the Web, it is perhaps safe to say that there millions of these programmes currently in existence today. Experts also estimate that in a single day, 1200 unique viruses are made for Windows and PC, and 7 for Mac. But the point of this article isn't on the viruses, but rather, the people who make them. 
Why do people make viruses? There can be several reasons why:

  • To control a computer and/or to make it perform a task
  • For money (this can include lifting one's personal information like one's ID, credit card numbers and passwords, etc.)
  • To prove a point (either that it can be done, for personal glory or for revenge)

Hackers: Different Types

Yup. The coolest ever.
Generally, the people who make them are called hackers. This term, however, is slightly ambiguous. According to Wikipedia, there are several interpretations of the term:
  • The first of these, as well as the most common, is a person committed to finding ways to get around Internet Security. This may include people who create viruses and Trojan Horses, as mentioned above, but may also include those who maintain the integrity of the Web. 
  • There is also a group of computer enthusiasts who name themselves "Hackers". This is a group that had its inception in MIT in the 1960's. It is notable for launching the Free Software Movement.
  • Finally, there is a home computing community of hobbyists. It focused on hardware in the 1970s and software from the 1980s onwards. 
However, it is the first type of hackers I wish to talk about today. 
Generally, a hacker may be defined as a person who seeks and exploits weaknesses in a computer system or network (Sterling, 1993). While previously operating underground, hackers have now started to come under the public spotlight, and can generally be classified into three groups: Black Hats, White Hats and Grey Hats.

Black Hats


Black hat hackers are hackers who violate computer security simply for malice or personal gain (Moore, 2005). These are the people most often portrayed in the media as potential if not actual criminals and are mainly the ones behind malware and virus creation. They often break into and cripple a network for no reason other than to destroy data for personal glory. 

White Hats

Close enough
White Hat hackers are not exactly the antithesis of Black Hats. They break security, but for non-malicious reasons. Some reasons for doing so include security checks, vulnerability assessments and penetration tests. Sometimes known as Ethical Hackers, these people often work for mainstream firms in performing online security or Web maintenance. Indeed, it is not uncommon for a Black Hat to change his ways (usually after getting caught) and become a White Hat, or vice versa. 

Grey Hats

What else, right?
The final broad category of hacker is the Grey Hat hacker. This is the most morally ambiguous group of hackers. They may sometimes act illegally, though not for personal gain or malice. They may, for example, hack into a company's security system, then proceed to inform the company of a weakness in their systems - along with the entire hacking community. They will then sit back and enjoy the developments. The term may also refer to a hacker who grapples with questions of law and/or ethics in his/her line of work. 

Conclusion

These are only the three broadest groups of hackers. There are many others, like Elite Hackers, Script Kiddies, Neophytes, Blue Hats, Hactivists and Bots, though their motivations and intent may be classified under either White, Grey or Black Hat. A couple of points I'd like to make are that firstly, hacking is not necessarily a criminal activity or carried out of malice. Many hackers are gainfully employed for maintaining web security and maintenance, and even police the Web for signs of malicious hacking. Secondly, with the Web becoming increasingly necessary for carrying out daily tasks, it is perhaps sadly inevitable that attacks and malware of this nature would increase. It therefore becomes necessary that we know, at least, what kind of tools are out there, and what kind of people are able to use those tools. 

Friday, March 1, 2013

On Education

I've always been interested in the field of education. Whether online or offline, this has something that I feel deeply about, especially since going through more than a decade of it. The fact that I have parents and close friends for teachers might have helped as well. However, the more I see of it, the more disillusioned I become of it. My reasons are best summed up here:



Takeaways:

1. Even if education goes online, it is not likely that the fundamental problems would go away. In fact, the problems inherent in the system might be exacerbated online due to the need for standardisation and the one-size-fits-all approach most educational institutions adopt so as to accomodate a wider audience.
2. This approach to education is highly radical and goes against the grain of many schools. But that said, cyberspace is the best place for that to happen. This is because there is so much interactivity and rich media in there that the online lecture (sadly, the only use schools can find for such a versatile platform) is really not even scraping the surface. As things stand, there are many schools that are beginning to use rich media to cater to their students, but it is not enough. The current system is too outdated.
3. School administrators and leaders need to let their teachers and staff use the Internet and other rich media to teach and educate their students, rather than prevent them from doing so. There also needs to be a shift in focus on education. It should not be on trying to make children academically smart, but rather should focus on making them better people.