ComputingRevision.net

Hacking

What is hacking?

Hacking is when someone tries to gain access to a computer or data without the owner's permission. There are several ways to do this…

  • Malware
  • Brute force attacks
  • Guessing passwords
  • Social engineering
  • Data interception

The Computer Misuse Act (1990)

Policeman

The law which makes it illegal to access a system without the owner’s permission. It also makes it illegal to use a computer system to commit other types of crime. If convicted, a hacker can go to prison for up to 10 years.

Brute force attack

Clipboard with ticks and crosses

A simple way to try to work out someone's pass-code is to try every single combination until the hacker eventually gets the right one. This can take a very long time, but a hacker might program a computer to do it, which would be much faster than a human attempt!

A hacker would probably start with information they already know about you. So if your phone pass code is your date of birth, you should definitely change it!

Choosing a good pass code

Good passwords should be:

  • Long
  • A mix of upper-case, lower-case, number, and symbol characters
  • Not be something personal to us (e.g. our pet’s name or our favourite football team)
  • Random characters, not full words

These precautions mean it takes much longer to try a brute force attack.

Different types of hacker

Black hat hacker

Black hat hacker
  • Non-ethical
  • Malicious intent
  • Make money by selling stolen data or blackmail
  • May cause damage for fun or to prove a point
  • Illegal — can be prosecuted

Grey hat hacker

Grey hat hacker
  • Somewhere between black and white hat hackers
  • Will hack into a system without permission
  • May claim a reward or ransom for reporting vulnerabilities to the system owner
  • Illegal — can be prosecuted

White hat hacker

White hat hacker
  • Ethical
  • Hired by the organisation they’re trying to break in to
  • Act professionally and do not cause damage
  • Perform penetration testing
  • Legal — can be very well paid!

Quick Quiz

Click the purple circle to select your answer

Which type of hacker performs penetration testing?

Black hat hacker
Red hat hacker
Grey hat hacker
White hat hacker