Sunday, October 24, 2010

Hacking Myths !

MYTH 1 : ANYBODY CAN DO IT 
Almost all of us have seen computer crimes in various Hollywood movies bringing down the banking system of an entire country with a single click of a mouse button unfortunately or fortunately, that is far from reality and hacking into a network is definitely not that easy.Although there are thousands of ready to use hacking tools available for free download on the internet using them and actually breaking into a network is not easy.
        Hacking into a system requires knowledge of programming languages,UNIX, networking concepts,and a little bit of luck ! Moreover breaking into a system requires several hours of reconnaissance work and years of experience.


MYTH 2: FOOLPROOF SECURITY
Individuals have spent thousands of man hours and companies thousands of dollars trying to reach the elusive goal of foolproof security.Unfortunately,there is nothing like foolproof security .It is not possible for anybody to create a system that will remain protected against attacks forever .Given enough time ,tools and experience , all system can be hacked into . Website , system and networks continue to remain vulnerable to attack .Even the websites of the world's most secure organisations such as the Pentagon ,CIA and NASA have been hacked int.


MYTH 3 : IT IS SO COOL                           
There is glamour and excitement associated with ethical hacking However , working as full time cyber security expert is quite different from dabbling in computer hacking as a hobby . Managing the security of the network infrastructure of an organisation is serious hard work . It requires hours of relentlessly performing almost the exact same security checks with a great degree of precision .One needs to be able to make use of trial and error methods ,constantly fight for higher budgets from management and call upon all their experience to be able to successfully keep attackers away.The job of a computer security expert involves a lot of responsibility focus , dedication and hard work as well . Most cyber security experts in the industry are on call practically all the time through the year since a cyber attack can strike anytime.


MYTH 4: ALL I NEED TO KNOW , I ALREADY KNOW 
The computer security industry  is dynamic and constantly changing .Everything in computer security changes every few weeks. It is very important for everybody in this field to constantly update and upgrade their knowledge with the latest tools ,techniques and methods being discovered in different parts of the world .It is important  for cyber security experts to be able to devote a large amount of time to learning ,unlearning and relearning  various concepts.Research is a very major part of the job profile of every cyber security expert!


MYTH 5: CATCH ME IF YOU CAN 
The Internet has no boundaries , which means that a criminal sitting in Russia can manage to hack into a system in India . Moreover ,it is very easy for the criminal in Russia to bounce off multiple proxy servers in other countries to disguise his identity and location .In such a case ,It is not very easy for the investigators to be able to determine the real identity and location of the culprit quickly . Moreover , there are numerous real life political ,diplomatic and geographical barriers.Unless there are common cyber laws for the entire world and a higher degree of cooperation between countries , solving cyber crimes is not going to get easier!


MYTH 6: I DON'T NEED SECURITY
Many people are under the impression that they don't have anything important on their systems however , what you think is useless information ,may actually be quite useful for a criminal who can misuse any personal ,financial or company data for various malicious purposes.Even if you don't have any such data on your computer ,you still need to protect yourself ,because it is quite possible that a criminal might hack into your system ,take control of it and then use  it to launch an attack against some other individual or organisation .In such a scenario,the victim might initiate legal action against you since the attack seem to originate from your system! 






                                                                                          Source: A.F.

No comments:

Post a Comment

IF YOU WANT TO COMMENT ON MY BLOG PLEASE DO SO. I DON'T REQUIRE COMMENTERS TO REGISTER OR DO ANY OTHER TIME CONSUMING WORK. EVERY WORD OF YOURS IS VALUED . THANK YOU.

ANY CONTAIN AND PICTURE IN THIS BLOG ARE USED FOR EDUCATIONAL , ANALYTICAL PURPOSE . IF ANY COPYRIGHT IS VIOLATED , KINDLY INFORM AND I WILL IMMIDIATELY REMOVE THEM .