Computer Hacking
Computer hacking,
on one hand, describes the activities practiced by individuals, organizations,
and nations, in order to gain unauthorized access to computer and technology
dependent systems. These activities may involve the modification or alteration
of system's software and hardware in order to perform activities neither
purposed by the creator nor in line with the creator's original intentions.
On the other hand, and
in a more positive connotation, it refers to the habitual activities of someone
who possesses exceptional skills and enjoys researching and analyzing the
innermost intricacies in computer programming.
Looking at both sides
of the definition, we can see that the general term is not permanently doomed
with a negative connotation. In fact, depending on the nature of the objectives
of the hacker, a differentiation has been stipulated in the computer world. As
such, hackers with malicious intent have been defined as crackers.
Hacking: Prevention
The world of
technology includes devices, software programs, and applications. Individuals
and organizations use various methods and precautions to protect their digital
assets from being compromised.
Updates
To prevent hacking,
it's important to update applications and devices as soon as
the updates are available. Updates not only enhance and improve the user's
experience with the application, but also they constantly improve and rectify
security weaknesses and loopholes in it. If 3 doors of the car are locked but
the 4th is not, your car's safety is measured by the open 4th door!
Password Security
Keeping passwords
secret is important, but ensuring they are not accessed or revealed is better.
Most secure platforms today demand complex passwords for login. This may
include capitals, numbers, and characters. Passwords are safest if they are not
shared with anyone - not even IT administrators and so-called organizational
representatives - or written down. It's also important to change them often.
Vetting Websites and
Web Sources
It's amazing how
careful we are when we use our credit and debit cards in public yet an even
more menacing threat exists right under our thumbs: downloading. There is an
app for everything these days, and everything is at the tip of our thumbs with
the download button. Failing to ensure that we access, sign up, download, and
interact with reputable sites can open ourselves up for trouble. Secure
websites are denoted by a padlock icon, which is positioned to the left of the
URL address.
Wireless Network
Access
It's also important to
be security conscious of the networks we access in addition to securing our
devices. Secure wireless access connections always require a password. We all
welcome free services, but we must remember they could be the source of our
future woes. Open wireless connections are known to be very vulnerable, and
communication over such unsecured networks could expose every key you stroke.
Protection Against
Phishing scams
We have spoken about
vetting web sources, but phishing scams are another serious
threat. They are fictitious emails that mimic the contents of your banking
website; for example, they may include instructions to follow a link that leads
you to a hoax site. The goal of this malicious threat is to steal your
sensitive data like login details, passwords, and pin numbers. The hoax site
looks identical to your banking website, but the URL on the other hand is
slightly different. Here's an example: