i want to gather information of dis topic along with some visualisations to use as slide shows..
A formal definition of hacking is :Unauthorized attempts to bypass the security mechanisms of an information system or network.Hacking is an attitude and practice surrounding the use, consumption, and
production of computer-related work.The ethos behind hacking has a long legacy, dating back at
least to the beginning of the century. In computing, a hacker is a person in one of several distinct classes like:
-People committed to circumvention of computer security.
-The hobbyist home computing community, focusing on hardware. The community included Steve Jobs(Apple CEO), Steve Wozniak(co-founder of apple) and Bill Gates(Microsoft) and created the personal computing industry.
-A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.
Computer security hackers
In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems.The media portrays the 'hacker' as a villain.But they have a role in correcting the security problems. With the release of the movie WarGames that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. As a result of these laws against computer criminality, white hat, grey hat and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.
Home computer hackers
In this context, hacker refers to computer hobbyists who push the limits of their software or hardware.The areas that did not fit together with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming. Some also try modding(modifying computer hardware and electronics for their benefit).
some general facts about hackers include:
1)Hacking occurs in a social context
2) Hacking is irreverent and informal, and this is in tension with the various
institutions that support hacking
3) Respect is gained through hands-on problem-solving
4) Hacking is concerned with opening black boxes and understanding their
5) Hackers are mainly male
Hacker groups:These have drawn more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), and H.O.P.E.
Hackers with different attitudes and aims use different terms to differentiate themselves from each other:
1)White hat:A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.
2)Grey hat:is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted
3)Black hat: sometimes called "cracker", is someone who breaks computer security without authorization or uses technology for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.
is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others and may have only little understanding of what it actually does.
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message.
Common methods used by hackers
It is a prepared application that takes advantage of a known weakness.Eg.SQL injection attacks injects malicious SQL code in maybe textboxes.
It is a tool used to quickly check computers on a network for known weaknesses.They also use port scanners for open ports to gain access.
It is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
5)Spoofing attack:It involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program.
It is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators.
It is a program which seems to be doing one thing, but is actually doing another. It can open a backdoor for attacker to gain access.
It is the art of getting persons to reveal sensitive information about a system.
It is a self-replicating program that propagates through computer networks without user intervention.
It is a self-replicating program that spreads by inserting copies of itself into other executable code or documents.
It is a tool designed to record ('log') every keystroke on an affected machine for later retrieval.confidential information typed on the affected machine, such as a user's password or other private data are sent to the attacker.
Full report download: