Hacking

toc include component="comments" page="Hacking" limit="10" HACKING =__Definiton of Hacking:__= =__Why Do Hackers Hack?__= A hacker may break into a system just out of curiosity or for the challenge - can they get through the system’s defences? But, it is more likely that they are breaking in to **access data**, usually because the data has **value**. For example, if a hacker enters your computer and steals **financial information** such as your credit card number, or the password to your bank account, they could use that information to make purchases. = = =__Can you protect your computer?__= There is no guaranteed way to stop someone breaking into a building (you can make it very difficult, but every security system has its weaknesses), there is also no //guaranteed// way to stop someone breaking into a computer system. However, you can make it **difficult** enough so that a hacker **moves on** and looks for an easier target. You should: = = =__Facts about Web Application Hacking:__= = = =__Real Life Hacking Scenario:__=
 * Hacking means to illegally access other people's computer systems in order to destroy, disrupt or carry out something illegal.
 * Hacking is usually carried out remotely, i.e. someone outside a company wants to try to break into the computer system.
 * Even if the hacker only does it as a challenge or for a bit of fun, it is still illegal.
 * Use **strong passwords** to protect your user login account
 * **Never reveal your login password** to anyone else
 * Place a **firewall** between your computer and any network
 * **Disconnect** from networks when you are not using them
 * **Encrypt** any sensitive information (just in case they get in)
 * Organized crime was responsible for 90% of all compromised data records that were used in a crime.
 * 74% of data breaches were initiated by external attacks.
 * 64% of data breaches are enabled by a combination of events. Hacking, malware, SQL injection and other forms of attack may all come into play in a single data breach
 * 285 million data records were exposed in the 90 data breaches, the equivalent of 9 exposures each second. This significantly exceeds the combined 230 million exposed records in the previous 5 years of this study

Computer hacking arrests: 'Jonathan Rees and Alex Marunchak' bailed.
Operation Tuleta is one of three linked Met Police probes into phone hacking A 61-year-old journalist and a 58-year-old man have been arrested as part of a Met Police probe into computer hacking. The two men, who were later bailed, were the News of the World's former Ireland editor, Alex Marunchak, and private investigator Jonathan Rees, sources told the BBC. They were arrested on Tuesday at their homes by officers investigating criminal breaches of privacy, as part of probes relating to phone hacking. The Met did not confirm their names. Police said they were arrested on suspicion of offences under Section 3 of the Computer Misuse Act 1990 and Sections 1 and 2 of the Regulation of Investigatory Powers Act 2000. Both arrests were made shortly before 07:00 BST and searches were carried out at the properties, police said. The 58-year-old, understood to be Mr Rees, was arrested in Surrey and was interviewed at a police station in south London. He was bailed on Tuesday night to return to a south London police station later this week. The 61-year-old, understood to be Mr Marunchak, was arrested in Kent and was interviewed at a Kent police station. He was also bailed to return to a central London police station in mid-February. (BBC NEWS, 3rd October 2012) = = =__The most targeted categories of hacked Web applications:__=
 * 1) Social networking sites such as Twitter and Facebook were the most attacked category of websites in 2009. The motivation was malware injection and ideological defacement.
 * 2) Retail, Media, Technology and Internet-related organizations were the next most-attacked category of Web applications. This includes e-commerce websites, retail shops, ISPs (internet service providers) and search engines. The motivation of attacks in this category is often theft of secure data.
 * 3) Law enforcement, government, political and financial websites saw a drop in the incidence of attacks in 2009. This most likely reflects improved security measures which are being taken by these organizations.

=__Computer Misuse Act__= Being jailed need to pay a fine lose you're rights to use a computer thare are different levels of hacking Level 1 Level 2 Level 3
 * Unauthorised access to a computer __without__ intent (hacking)
 * Access was deliberate
 * Access was unauthorised
 * The hacker knew what they were doing
 * Includes browsing, accessing forbidden areas, viewing files/e-mails
 * Unauthorised access to a computer with intent to commit __another__ criminal act
 * Includes selling data to rival companies, fraud, blackmail etc
 * Unauthorised __changing__ of computer material
 * Deliberately deleting, modifying, corrupting data and files to commit a criminal act
 * Includes deliberate planting/creating of viruses, Trojans, worms and logic bombs

media type="youtube" key="J5OoRjLLM3c" width="425" height="350"media type="youtube" key="4a0g4_bX6AQ" width="425" height="350"media type="youtube" key="vhRScF7uwMA" width="423" height="371"