Hacking


Most of us equate hacking with malicious activities. In fact, hacking is defined as working diligently on a computer system until it performs optimally. The popular use of the term hacking is more related to cracking, which is defined as the act of unlawfully accessing a network infrastructure to perform unethical activities. But for the purposes of this book, the widely accepted term hacking denotes malicious activities directed at networks and systems.

Types of Hackers

There are as many motivating factors for hacking as there are hacker types. From the script-kiddy who downloads hacking shareware and follows on-screen instructions to the cyber-terrorist, one thing is certain: They want to inflict pain on your organization.

Also, although they are not necessarily qualifying as hackers, careless employees can also be dangerous to your organization.

Even a CEO Can Be Dangerous to His Company

Following a slideshow presentation, the CEO of a publicly traded company briefly stepped aside from the podium. Upon his return, he discovered that his laptop, with all its precious corporate information, was gone. A security policy that forces employees to use a locking system for their laptop might have prevented this theft.


White-Hat Hackers

Not all hackers spell trouble. White-hat hackers are either reformed hackers or network professionals who have achieved mastery of the art and science of hacking. White-hat hackers are paid to provide penetration testing of the corporate network and to produce a detailed report of their findings. White-hat hackers are sometimes hired inconspicuously by senior management to test the ability of the IT department to detect and deal with attacks.

White-Box and Black-Box Hacking

White-box hackers are provided with some design and knowledge of an organization's network infrastructure prior to attempting their hacks of the system. Black-box hackers have no prior knowledge of the network before attempting to hack it.


Regardless of whether the hacking motivation is benevolence, carelessness, or maliciousness, hackers wouldn't exist if vulnerabilities weren't available to exploit. The next section delves into network vulnerabilities.




Campus Network Design Fundamentals
Campus Network Design Fundamentals
ISBN: 1587052229
EAN: 2147483647
Year: 2005
Pages: 156

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net