Friday, April 27, 2018

Computer Hacking

Computer Hacking
Computer hacking, on one hand, describes the activities practiced by individuals, organizations, and nations, in order to gain unauthorized access to computer and technology dependent systems. These activities may involve the modification or alteration of system's software and hardware in order to perform activities neither purposed by the creator nor in line with the creator's original intentions.
On the other hand, and in a more positive connotation, it refers to the habitual activities of someone who possesses exceptional skills and enjoys researching and analyzing the innermost intricacies in computer programming.
Looking at both sides of the definition, we can see that the general term is not permanently doomed with a negative connotation. In fact, depending on the nature of the objectives of the hacker, a differentiation has been stipulated in the computer world. As such, hackers with malicious intent have been defined as crackers.
Hacking: Prevention
The world of technology includes devices, software programs, and applications. Individuals and organizations use various methods and precautions to protect their digital assets from being compromised.
Updates
To prevent hacking, it's important to update applications and devices as soon as the updates are available. Updates not only enhance and improve the user's experience with the application, but also they constantly improve and rectify security weaknesses and loopholes in it. If 3 doors of the car are locked but the 4th is not, your car's safety is measured by the open 4th door!
Password Security
Keeping passwords secret is important, but ensuring they are not accessed or revealed is better. Most secure platforms today demand complex passwords for login. This may include capitals, numbers, and characters. Passwords are safest if they are not shared with anyone - not even IT administrators and so-called organizational representatives - or written down. It's also important to change them often.
Vetting Websites and Web Sources
It's amazing how careful we are when we use our credit and debit cards in public yet an even more menacing threat exists right under our thumbs: downloading. There is an app for everything these days, and everything is at the tip of our thumbs with the download button. Failing to ensure that we access, sign up, download, and interact with reputable sites can open ourselves up for trouble. Secure websites are denoted by a padlock icon, which is positioned to the left of the URL address.
Wireless Network Access
It's also important to be security conscious of the networks we access in addition to securing our devices. Secure wireless access connections always require a password. We all welcome free services, but we must remember they could be the source of our future woes. Open wireless connections are known to be very vulnerable, and communication over such unsecured networks could expose every key you stroke.
Protection Against Phishing scams

We have spoken about vetting web sources, but phishing scams are another serious threat. They are fictitious emails that mimic the contents of your banking website; for example, they may include instructions to follow a link that leads you to a hoax site. The goal of this malicious threat is to steal your sensitive data like login details, passwords, and pin numbers. The hoax site looks identical to your banking website, but the URL on the other hand is slightly different. Here's an example:

No comments:

Post a Comment