1. Hacking means the act of breaching into a computer or network. Hacking can occur two ways, it can occur in person if the hacker has physical access to the computer or network or through the Internet which tends to be the most common way.
2. Some of the illegal acts performed during hacking are stealing important data like credit card information, corrupt a computer system, and create and disperse spam.
3. Hacking has become quite easier due to the growing wireless network popularity, which allows hackers to gain unauthorized access to a wireless network by simply being a couple a hundred feet from an unsecured wireless access point.
4. Hacking is not only a concern for the average computer user, but can be a threat to national security to countries. There are so many systems that are run for security purposes with the use of Internet connection that a hacker could be able to get into a major government system. This has bought an increase risk in cyber terrorism.
5. There are many things that could be affected by cyber terrorism that include: banks, airlines, stock markets, and big systems like the nation’s power grid.
6. The majority of hackers conduct broad-based, indiscriminate probes of any and all computers connected to the internet.
7. Targeted attacks against large businesses or government entities are far less common, but garner a lot of attention. This is why it is important for any computer user to take security measures that lessens the ability of hackers to steal the resources of a system.
8. Hijacked computers can be just as valuable as stolen data due to their raw computing power and internet connections. Any hijacked computer is a worthy addition to the hackers’ arsenal of zombie computers and botnets. Hackers will use hijacked computers to send out spam and emails containing viruses and other malware, disseminate illicit materials or take part in hacking attacks in other computer networks.
9. In summary, hackers may use hijacked systems to perform the following illegal actions.
• To send unwanted spam.
• To engage in click fraud (A type of Internet crime that occurs in pay-per-click online advertising when a person, automated script or computer program imitates a legitimate web user clicking on an ad, for the purpose of generating a charge per click).
• To send malicious emails to your friends, family and clients. In this way hijacked systems function as a spreader of viruses, malware and spyware.
• To install a key logger and capture every username and password typed; they can then use your computer to log into your financial accounts; conduct transactions and perpetrate electronic theft.
• To mount a coordinated attack on select targets, such as banks or governmental institutions.
• To sniff out other traffic on your network. Any networked computer can be used to “sniff” out and copy traffic on your network, such as the network traffic from credit card or other data processing servers.
• To use your computer to send out data through the internet. In extreme cases, they can use it as a hub to exchange illicit, illegal or stolen materials, as a relay station to hide the true origin of certain content or as a message board for shady activities
• the six most common ways your data can be stolen are Phishing, Malware
Malicious mobile apps, Smishing, Physical security threats and Insecure networks