The Hacker, Hacking Tactics and The Victim
The Hacker, Hacking Tactics and The Victim
HACKING
TACTICS AND
THE VICTIM
Who is the hacker?
may refer to anyone with technical
skills, but it often refers to person
who uses his or her abilities to gain
unauthorized access to systems or
networks in order to commit crimes.
Types of Hackers
1. White hat- also known as ethical hackers, strive to operate in the public's best interest, rather
than to 'create turmoil.
2. Black hat- intentionally gain unauthorized access to networks and system with malicious
intent, whether to steal data, spread malware or profit from ransomware, vandalize or otherwise
damage systems or for any other reason including gaining notoriety.
3. Gray hat- fall somewhere between white hat hackers and black hat hackers, While their
motives may be similar to white hat hackers, gray hats are more likely than white hat hacker to
access without authorization; at the same time, they are more likely than black hat hackers to
avoid doing unnecessary damage to the systems they hack.
HACKING TECHNIQUES
1. BAIT AND SWITCH
2. Use strong passwords, don’t repeat your passwords on different sites and make
sure to change your passwords regularly. A password management application can
help you to keep your passwords locked down.
4. Manage your social media settings to keep most of your personal and private
information locked down. Social engineering cybercriminals can often get your
personal Information with just a few data points, so the less you share with the
broader world, the better.
5. Secure your home network with a strong encryption password as well as a VPN. A VPN will
encrypt all traffic leaving your devices until it arrives at its destination. Even if a hacker manages to
get in your communication line, they intercept anything but encrypted traffic.
6. Talk to your children about acceptable use of the Internet without shutting down communication
channels. Make sure they know that they can come to you in the event that they're experiencing
any kind of online harassment, bullying or stalking.
7. Keep up to date on major security breaches. If you have an account on a site that’s been
impacted by a security breach, find out what the hackers know and change your password
immediately.
8. If you believe that you've become a victim of a cybercrime, you need to alert the local police and
other law enforcement agencies who are also involved in the investigation of cybercrimes. Even if
the crime seems minor this is Important, as you are helping to prevent criminals from taking
advantage of other people in the future.
Risk management typically falls into 7 areas:
1. Avoidance - Take a close look at what information you store and what you
need to store. For example, 1-2 years after a purchase maybe you don't
need the credit card number anymore and can blank it out with a
permanent marker but still keep the receipt in case of a tax audit.
2. Prevention - prevent access to data, prevent the removal of data from the
business, etc.
3.Reduction - Reduce a loss -if it does occur, Take measure like placing limits on
the amount that can be withdrawn from a bank account at any time.
4. Separation - Separate names from credit card numbers whenever possible. Separate
user names from Passwords (store them in separate databases). Separate Customer
data from the internet by only accessing it on a computer that doesn't have an
internet connection or email account.
5. Duplication - You actually want to reduce the duplication of customer data as the less
duplicates the less chances of theft but you may want to duplicate firewalls, etc.
6. Transfer - This is the biggest one, transfer the risk of storing credit card data to a third
party processor like PayPal or your bank. Let them take the risk of storing credit cards.
Also, insurance is a form of transfer as you are transferring your risk to the insurer.
7. Retention -As a last resort, be aware of the risk but if you cannot effectively manage it
you must retain it or avoid it (by not engaging in business).
Determinant Factors for Preventing Cyber Crime
1.Law Enforcement- The law enforcement is very weak and in order to strengthen the law, the
maximum fine should be increased as well as imprisonment so that the guilty will be charged.
2.Attitude awareness- In order to prevent cyber-crimes, creating attitude awareness during online
business is important. Business entrepreneurs from the survey are unaware cyber-crime, thus,
awareness programs on preventing cyber-crime should educate them in order to ensure
entrepreneurs feel safe during online business transaction.
3.Ethics- A good ethics while doing online business transaction should be addressed by
entrepreneurs and they should respect potential buyers and seller by giving detail information and
respect each other during online business.