Hacking is an attempt to misuse a computer or private system/network. It is an unauthorised access to get control over other computer network security systems for illegal usage. The person who is engaged in these hacking activities is referred as a hacker. It is finding a weakness in computer network or system and gaining access to the particular network which leads to misuse of personal data.

A person has to be highly intelligent and skilled in computer languages to be able to hack any data. On Practical grounds breaking into security systems needs more expertise than actually creating one.

There are no hard rules to categorize hackers but in general terms they are known as:

  • White hat hackers
  • Black hat hackers
  • Grey hat hackers

Hacking basically means using computers to commit fraud, steeling corporate data, privacy invasion. Cybercrime cost many organizations huge amount of money every year.

Some Hacking incidents like

a. In June 1990 Kevin Poulsen teenager Telephone Hacker hacked the telephone lines on Los Angeles-area radio station and he also allegedly wiretapped a Hollywood actress and hacked into Army and FBI computers.

b. At the age of 15 Jonathan James hacked US defence threat reduction agency and hacked NASA systems stole $1.7 million worth of software. As result NASA was forced to shut down their system for 3 weeks which cost $ 41,000.

c. British citizen Gary Mckinnon has been called the dangerous hacker in history after being accused of hacking 97 united states military and intelligence systems over a 13-months period in 2002.

Hacking Basics



A Computer Virus is a piece of code that is uploaded in our computer without our knowledge and runs according to the coding done by the hacker, it executes without knowing users. It also has the ability to replicate and spread it selves. All computer viruses are man-made. Viruses are usually transferred through downloads, USB drives, emails, attachments, clicking on random links.

Ransomware is a type of virus which restricts access to own computer system, files and folders because all the data become encrypted and demand an online payment to the virus creator in order to retrieve data.

How to Prevent virus


The term Password cracking means your account has been hacked by a hacker using various methods to gain access to your account. It is done by either guessing the password using a computer algorithm in which the computer tries many combinations till the password is found or using Key logger where it records the keys struck on keyboard.

It is basically time consuming process where a hacker needs to keep on guessing the password randomly till he successfully founds the original password and this method is called Brute force attack.

Password Cracking



It is an online platform that allows users to create a public profile and interact with other users on the website. Social networking sites usually have a new user input a list of people with whom they share a connection and then allow the people on the list to confirm or deny the connection. After connections are established, the new user can search the networks of connections to make more connections.

A social networking site is also known as a social networking website or social website.


  1. Locked out from owns account
  2. Impersonation
  3. Loss of personal information
  4. Misuse of contents uploaded on sites
  5. Business loss


  1. Enabled two factor authentications
  2. Sharing too much information in social networking sites
  3. Use strong Password
  4. Be selective with third party applications
  5. Move passwords to a management program


It is technique which is used commonly to manipulate people so that they give their confidential information. The type of information hackers seek may vary but when a particular organization or individual is targeted the hackers usually try to trick them into giving their password, bank information, access over computer to secretly install spying software or any sort of information which will give them access to your personal/ confidential data which will be leading to identity theft. Example- credit cards fraud is common now a day as an individual pretends to be someone else and can have access to any bank account linked with the card.


  1. Economic Loss
  2. Temporary closure
  3. Goodwill Damage
  4. Lawsuits
  5. Permanent Closure
  6. Dangers of Terrorism
  7. Arbitrations
  8. Loss of privacy
  9. Identity theft

Prevention: –

  1. Neverprovide confidential information
  2. Account blocking after failed attempts
  3. Access privileges
  4. Get training to increase awareness on social engineering
  5. Usage of anti-phishing tool 


  Why hackers are needed????

An Ethical Hacker is a computer and networking expert who attempts to penetrate inside computer systems or network with the permission from its owners for the purpose of finding security loopholes that a malicious hacker could exploit. Companies hire ethical hackers to protect the data from being hacked which will lead to huge business loss.


Reasons why ethical hackers are required: –

Need for Ethical Hackers