atif_hacking

= __**types of intrusion; hacking**__ =

__**Definition:**__ Hack has several meanings in the technology and computer science fields: a clever or quick fix to a computer program problem; a clumsy or inelegant solution to a problem; or a modification of a program or device to give the user access to features that were otherwise unavailable to them.

Breaking into computer networks; Bypassing passwords or copy protection in computer software; Defacing and/or damaging Internet web sites; Causing a denial of service attack on a web site or network (preventing legitimate users from accessing a web site); Stealing valuable information such as passwords and credit card data.
 * Some of the most common types of hacking include:**

__**Types of Hacking Attacks**__ Internet security vendors Velocet Security list the major types of hacking attacks:


 * · Trojan Horse.** This is a program containing a concealed malicious code, and is often used to steal passwords. The login program of a computer is replaced with one that copies the passwords used by the computer owner. This information can then be used fraudulently.


 * · E-mail Fraud** -- Forgery and Anonymity. E-mail is a great way to communicate over the Internet, but is particularly suited for anonymity. Many online scams depend on fraudulent e-mails.


 * · Viruses/Malicious Codes.** The most familiar form of malicious code is the computer virus, a fragment of code that attaches to the boot sector of a disk or to executable files on the disk. Whenever the boot sector or host file is loaded into memory and executed, the virus is activated, spreading from computer to computer through floppy disks and computer networks. Some of these viruses reformat hard drives, destroying all their files. Others are simply nuisances, printing messages or graphics, playing music, or causing congestion that slows computers down.


 * · Worms.** In 1988 a graduate student at Cornell University launched one of the most famous worm hacks. These are active programs designed to spread through computer networks, often causing catastrophic damage. The 1988 Internet worm eventually infiltrated thousands of network computers, completely incapacitating them.


 * · Bombs.** There are many kinds of bombs. "Logic bombs" are malicious codes that "detonate" in response to some event. A "time bomb" simply goes off at a particular time. Viruses can act like time bombs, lurking in the cyberdark until they have had a chance to spread and "explode" suddenly. A famous example is the Michelangelo bomb, which was supposed to explode on the artist's March 6 birthday. "Letter bombs" are destructive e-mail messages which can explode when the message arrives, is read or loads into memory.

_**Protection Measures**__

By and large, anti-hacking measures fall into the following broad categories:


 * · Firewalls.** The most popular solution to business security concerns, Velocet says, is the firewall, a computer that shields the internal network of a company from the Internet at large. They also allow the construction of security domains within the company network.

· **Encryption.** Encryption schemes encode a file or program, protecting them during local storage or transmission via FTP or another electronic transfer method. An example is Secure HTTP, a protocol enabling cybershoppers to click a "secure submit" button at a shopping site to encrypt their order forms and secure their credit card data. Encryption can be used to facilitate all aspects of security.

· **E-mail Security.** E-mail is increasingly protected, using such technology as encryption, digital signatures and anonymous mailing services.

· **Passwords and PINs**. Effective against low-level nuisance hacking. These restrict access and identify individuals online. There are products on the market, token authentication systems, which will generate a new PIN almost every minute so there is no chance the code could be stolen and used.

Sourced:

"FBI probes Unisys after U.S. government hack." Computer World. 24 Sept. 2007. 29 Sept. 2007 .