ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

What is Computer Systems Hacking

Updated on July 24, 2014

Hacking keeps systems administrators at their wits all the time.

Prolific coders have a good understanding of how computer systems work.
Prolific coders have a good understanding of how computer systems work.

What is computer systems hacking?

The first and most amazing Systems hacks occurred almost a century ago. Back in 1903, a renowned inventor Nevil Maskelyne interfered with a public showcasing of wireless telephony system by John Flemings. By breaking into the system, Nevil Morse coded insults which were displayed on the auditorium projector to the horror of those in attendance. Since then, many computer expert have followed at times leading to massive losses; finance wise and data.


So, what is computer systems Hacking?

Depending on the intentions and the resulting effects, hacking can have a myriad of definations. However, hacking is processes that involves unauthorized access into a computer system by utilizing the weaknesses in design and administration.

How has computer hacking been defined in the past

There is a thin line between ethical hacking and ‘mainstream’ hacking since they are apply the same techniques. Motivation is the only differentiating factor. When it is meant to be a standard routine of safeguarding the systems, it’s chiefly referred to as “white hat” hacking, a slang used on the internet to refer to acceptable, beneficial and ethical process. However, when unknown individual use malicious code to gain access to a computer system, the term “black hat” is employed used. The thin line between the two is the code of conduct. Ethical hacking, this code spells out the rules that governs the process.

In a global world where millions of computers are interconnected to promote sharing remotely, then the code of ethics imperative since it would have been impossible to safeguard organizations sensitive information and systems’ security if ICT administrators were given unrestricted mandate of action. From this view point, ethical hacking is seen as the liberty for systems administrators to alter systems operations as along as it follows the spelt out code of conduct.

Hacking at the workplace

What is Place of hackers at the work place?

Remote systems hacking have been in the news for all the bad reasons; thanks to the media attention. Many corporate leaders, too, view hacking as a grand breach of the organizations core systems and which has the capability to curtail organization operations, risk of sensitive data loss or even stealing of data for use by competing entities. For the better part of recruiting their systems engineers and administrators, organization leaders employ great caution and deliberations so as to ensure that only the most trusted individuals are given the capability to access, view or alter organizations computer systems. And even then, such individuals act under a predefined code of conduct and their mandate is limited to only improving the system and safeguarding from external attacks. For example, systems administrators should ensure that a system is well secured and systems are hardly accessible by fellow unauthorized colleagues and workers. But it is always inevitable to have a 100% trust level in 100% of the organizations. Malicious systems access and hacking is always bound to happen.

Black Hat hacks that shook the world

Systems that were targeted
Country
Effects
1. Boleto payments
Brazil
lead to a loss of $700 million from browsers attacks
2.Network Playstation attack of Sony
Japan
Sony website was closed for a full month. It lead to hacking into more than 77 million accounts.
 
 
 

Hacking and ethics

Should controlled hacking be adopted in the workplace Policies?

See results

How do black hacks work?

Hacking is a result of sustained efforts to breach the systems security walls with an aim to gain financially, data wise and at times oppressing and harassing. Some organizations have systems so well safeguarded that it is almost always impossible to hack into their systems. But hackers are always on their wits. Since not all organizations have systems designed to stave off hackers underground operations, hacking always occurs, and if and when it occurs it leaves devastating effects to corporations and their clients alike. A few, exceedingly talented individuals create code which is aimed at compromising security and gaining access to a system vital resources. The code is used by equally curious persons, who have a good understanding of systems’ working, to seek loopholes in network systems and use them to manipulate them at their will.

Hacking involve meticulous planning, code and system mastery as well as calculated networking

Legion of Doom grouping wrecked havoc through their  computer systems coding exploits
Legion of Doom grouping wrecked havoc through their computer systems coding exploits | Source

Where do hackers target often?

Computer systems in small organizations are not the only target by hackers. Actually, more experienced, hard core hackers have targeted systems that command massive traffic online, or those which command great influence in their niche e of specialization. Though email marketing has brought good tidings in its strides, interestingly, it has acted as bait to hackers based capability to deliver messages in their numbers, and at an instant. Hackers are thus motivated by sheer number for hundreds of thousands of email accounts that could be gained from hacking corporate email data banks. In Miami, for example, a teenager hacked into the NASA systems and stole well over 300 000 emails address. This forced the system to be shut down for up to 21 days as the systems were being scrutinized.

Has there been notable black hat hacking in the past

Some of the more famous hacks were meticulously planned and executed, while others were freaks of accidents. Nonetheless, they altered the terrain of hacking.

Kevin Poulsen hacked radio system to become the 102nd caller

Kevin ended up winning a Porsche  car as the prize
Kevin ended up winning a Porsche car as the prize

Kevin Poulsen

Kevin Poulsen is one illustrious expert in computer systems. He is more famous for his hacks than for his consultancy prowess at his technology firm Computer Security. Up on his wit, he manipulated thee KIIS-Fm radio show to become the 102nd caller and ultimately earned the grand prize; a grand Porsche car. And when NBC aired the mysteries unsolved, its telephone system crashed. Now that’s a coincidence. He is today an IT consultant at his own firm.

Phone 'Phreaking'

Steve Wozniak used his telephone 'Phreaking' skills to call world leaders free of charge.
Steve Wozniak used his telephone 'Phreaking' skills to call world leaders free of charge. | Source

Steven Wozniack

A graduate of University of California, Steven Wozniak, helped co found Apple Inc. with Steve Job. He is easily the more known of hackers who have manipulated the telephone systems without the risk of ever facing the law. Through ‘phreaking’ a term used to refer to manipulating the telephone systems, he was able to make long distance call free of charge. To amuse himself, he sought the attention of high and mighty most notably the pope. His presence at apple has much to do with his maneuvers.

Robert Tappan Morris

Robert Tappan Morris a professor at Institute of technology, Massachusetts caused damages in their millions almost by accident. His was a noble act of curiosity. He was trying to formulate a method of testing the size of internet. By created a self replicating Morris worm, he caused havoc through repairs and crushing of systems where the worm attacked. Though he was reprimanded and jailed, his works are at display at Boston museum and him a professor at MIT.

Andrian lamo used cyber and coffee shops for his exploits
Andrian lamo used cyber and coffee shops for his exploits

Adrian Lamo

In the growing list of hackers who manipulated renowned website is Adrian Lamo. At the beginning, Lamo had noble mission. His was an act of fun and self challenge. Until he hacked US government databases and leaked the information to Wiki leaks in the name of Bradley Manning. He is credited with hacking New York Times and adding his name to the databases. His was a case of curiosity gone too far.

Kevin Mitnick

How can an individual hack so many websites, all of standing stature and avoid scrutiny. Kevin Mitnick did. He has accessed systems at Nokia, more at Fujitsu and even at Motorola. He must be outstanding. That’s why he started his own consultancy firm; to exercise his capabilities in an ethical way and at will.

Def con forums

Certainly, this article cannot be complete in entirety without a considerable mention of Defcon Forums. Perhaps due to the fact that it marks a gathering of experts in computer systems security from all over the globe. With Las Vegas playing host to the 21st conference in August of year 2013, Defcon has been in existence for quite a while. Tech savvy individuals drawn from across the globe in the fields of computing and computer systems security gather in chosen Centers to explore a rage of issues shaping the computer industry. The conventions present opportunities to explore new ways to protect computer systems such as government websites and corporate set ups from attacks by black hat attacks.

Defcon forum

Las Vegas hosted the 21st annual Defcon conference in August 2013.
Las Vegas hosted the 21st annual Defcon conference in August 2013. | Source

Final thoughts

As the internet continues to grow and accessibility increased, individuals and organizations are bound to experience more cyber attacks. Thus, the market for ethical hackers will go steadily to keep black hats at bay.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)