Friday, March 29, 2013

Hackers and Internet Security

The idea that there are now so many viruses on the Internet that can be unwittingly downloaded is slightly disturbing, to say the least. With all the malware floating around on the Web, it is perhaps safe to say that there millions of these programmes currently in existence today. Experts also estimate that in a single day, 1200 unique viruses are made for Windows and PC, and 7 for Mac. But the point of this article isn't on the viruses, but rather, the people who make them. 
Why do people make viruses? There can be several reasons why:

  • To control a computer and/or to make it perform a task
  • For money (this can include lifting one's personal information like one's ID, credit card numbers and passwords, etc.)
  • To prove a point (either that it can be done, for personal glory or for revenge)

Hackers: Different Types

Yup. The coolest ever.
Generally, the people who make them are called hackers. This term, however, is slightly ambiguous. According to Wikipedia, there are several interpretations of the term:
  • The first of these, as well as the most common, is a person committed to finding ways to get around Internet Security. This may include people who create viruses and Trojan Horses, as mentioned above, but may also include those who maintain the integrity of the Web. 
  • There is also a group of computer enthusiasts who name themselves "Hackers". This is a group that had its inception in MIT in the 1960's. It is notable for launching the Free Software Movement.
  • Finally, there is a home computing community of hobbyists. It focused on hardware in the 1970s and software from the 1980s onwards. 
However, it is the first type of hackers I wish to talk about today. 
Generally, a hacker may be defined as a person who seeks and exploits weaknesses in a computer system or network (Sterling, 1993). While previously operating underground, hackers have now started to come under the public spotlight, and can generally be classified into three groups: Black Hats, White Hats and Grey Hats.

Black Hats


Black hat hackers are hackers who violate computer security simply for malice or personal gain (Moore, 2005). These are the people most often portrayed in the media as potential if not actual criminals and are mainly the ones behind malware and virus creation. They often break into and cripple a network for no reason other than to destroy data for personal glory. 

White Hats

Close enough
White Hat hackers are not exactly the antithesis of Black Hats. They break security, but for non-malicious reasons. Some reasons for doing so include security checks, vulnerability assessments and penetration tests. Sometimes known as Ethical Hackers, these people often work for mainstream firms in performing online security or Web maintenance. Indeed, it is not uncommon for a Black Hat to change his ways (usually after getting caught) and become a White Hat, or vice versa. 

Grey Hats

What else, right?
The final broad category of hacker is the Grey Hat hacker. This is the most morally ambiguous group of hackers. They may sometimes act illegally, though not for personal gain or malice. They may, for example, hack into a company's security system, then proceed to inform the company of a weakness in their systems - along with the entire hacking community. They will then sit back and enjoy the developments. The term may also refer to a hacker who grapples with questions of law and/or ethics in his/her line of work. 

Conclusion

These are only the three broadest groups of hackers. There are many others, like Elite Hackers, Script Kiddies, Neophytes, Blue Hats, Hactivists and Bots, though their motivations and intent may be classified under either White, Grey or Black Hat. A couple of points I'd like to make are that firstly, hacking is not necessarily a criminal activity or carried out of malice. Many hackers are gainfully employed for maintaining web security and maintenance, and even police the Web for signs of malicious hacking. Secondly, with the Web becoming increasingly necessary for carrying out daily tasks, it is perhaps sadly inevitable that attacks and malware of this nature would increase. It therefore becomes necessary that we know, at least, what kind of tools are out there, and what kind of people are able to use those tools. 

No comments:

Post a Comment