Coding or hacking? Exploring inaccurate views on computing and computer
For more efficiency, computers need to be networked for organizational communication instead of isolated. Due to the connection of these computers, they are exposed to outside attacks and hacking. System hacking is used to commit fraudulent acts by using the computer. These fraudulent acts include invasion of privacy, fraud, and stealing personal and corporate data. Computer hacking is termed illegal. There are different ways hackers view themselves. The types of attacks discussed in this article include nontechnical assaults, network-foundation assaults, and operating framework assaults.
The group of hackers includes the black hats. These are the ones who hack to steal data and other malicious intents. The gray hats hack without authorization but identify weaknesses and expose them to the organization. The backdoors gain access without much knowledge by using the existing tools. Hackers use tools such as trojan horse, which are software that looks good, but in a real sense, they are made to give access to attacks. The virus is a program that self- repeats and creates duplicates. There are worms, vulnerability scanners, exploit, sniffer, social engineering, and rootkit. The types of hacking are also discussed in this article, including rogue access points, inside jobs, anarchists, crackers, and kiddies, and sniffing and spoofing.
Gutierrez, F. J., Simmonds, J., Casanova, C., Sotomayor, C., & Hitschfeld, N. (2018, February). Coding or hacking? Exploring inaccurate views on computing and computer