Hacking, a leading crime.


 TERM PAPER


PAPER TITLE: Hacking, a leading crime.


DEERWALK INSTITUE OF TECHNOLOGY
SCHOOL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
SIFAL, KATHMANDU, NEPAL.


NAME: Suman Thapa
ROLL NUMBER:0215
CLASS: 0216 ‘A’



SUBMITTED DATE: 9/24/2013





Contents
Methodology…….………………………………………………………………………..………………..1
History of hacking…………………………………………………………………………………………..2
Charts..…………………………………………………………………………..........................................2

Abstract

Nowadays Hacking has been one of the common practices made by the computer expert in order to try
and find vulnerabilities in a network infrastructure. In this paper I have mentioned three different types
of Hacker i.e. White Hat Hacker, Grey Hat Hacker and Black Hat hacker. White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose.  Whereas Grey Hat Hacker is a Hacker who is part White Hat and part Black Hat. They can be both helpful and harmful purpose. Grey Hat Hackers can also be known as ethical hackers. Similarly last and most demanding types of hacker known as Black Hat Hacker is described in this paper. It is also known as cracker or dark side hacker. Further, we talk about Daily trends of hacking attacks including Distribution of Attack Techniques and Distribution of Targets. We also found which country has high risk of hacking. In this way I also have found the preventive measures for being safe from hackers.

Introduction

The word ‘hack’ refers to use a computer to gain unauthorized access to data in a system. When someone modifies computer hardware or software in a way that alters the creator's original intent, it is known as computer hacking and People who hack computers are called hackers. Nowadays Hacking has been one of the common practices made by the computer expert in order to try and find vulnerabilities in a network infrastructure. There are  different types of hacking  White Hat Hacking, Grey Hat Hacking and Black Hat hacking. White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose. Similarly other type of hacking is Grey Hat Hacking in which he or she is submerged in the world of hacking for non-profitable purpose Grey Hat Hackers can also be known as ethical hackers. Similarly last and most high demanding types of hacking known as Black Hat Hacking is describe in this paper. It is also known as cracker or dark side hacker. In this types of hacking he or she is fully involve in profit making activities by destroying organization network, stealing others valuable data ,documents, hacking bank account and transferring  money to their own and so on.

Methodology
This research is based on internet. It is a totally web based research. Different types of hacking with their motivates are found using internet. Also the daily trend of attack is studied in this paper. The top 3 countries leading in high hacking is found on the basis of previous researches. Since, only few data were existed on the basis of objective of research so it took lot of time in searching. I went through almost all the search engines. Time taken for finding results differed in each search engines. However, I managed to do the best in my own view.

There are three types of hackers and they are white hat, grey hat, and black hat. 
White hat hackers : White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose.
A Grey hat hacker is a Hacker who is part White Hat and part Black Hat. They can be both helpful and harmful, and should be treated with respect.
A Black hat hacker. In this types of hacking he or she is fully involve in profit making activities by destroying organization network, stealing others valuable data ,documents, hacking bank account and transferring  money to their own and so on.
History of hacking
Nowadays many people have different views on the hacking scenes. The origin of the term "hacker began in the 1960s at MIT (Massachusetts Institute of Technology) similarly during 1960s hackers emerged out of the artificial intelligence labs at MIT.
In1969, Bell Labs employee Ken Thompson invented UNIX. Then in 1970s, Dennis Ritchie invented "C” programming language which was specifically invented to be used with UNIX. ARPANET (
Advanced Research Projects Agency Network) was founded by the Department of Defense as a means to link government offices later on it was evolved into internet.
Charts
Here the summer shows its effects showing a constantly decreasing shape after the peak occurred the 15th
Sorry 4 the technical error
Below is the chart of Distribution of Attack Techniques and it is found that Defacements lead the Chart. Also the account Hijackings are becoming very popular. Whereas SQLi and DDoS are out from the first three ranks. Defacements are taken into consideration only when they are meaningful, that is targeting Governmental primary domains or high profile targets, or also when they cause the leaking of data.
Sorry 4 the technical error
The Distribution of Targets Chart below confirms governmental targets at the first place with nearly 30%, immediately followed by, as usual, industries (18.8%) & organizations (12.5%). In any case the level of attention of crooks is also high against targets belonging to the Financial and News sector, which steadily rank respectively at number 4 & 5 of this unwelcome chart with the 10.9% and 9.4%.

Sorry 4 the technical error
                                                            
Hacking attacks in US , India and China
Here are the 3 countries with respective data showing their hacking statistics
1. United States
The United States topped in overall malicious activity measured by Symantec, with 19 percent of the total in 2009. This is a drop from 23 per cent in 2008. The United States was the country of the most bot-infected computers observed by Symantec in 2009, accounting for 11 per cent of the global total, a slight decrease from 12 percent in 2008. It also topped as the No.1 country of origin for Web-based attacks in 2009, accounting for 34 per cent of the worldwide total.
2. China
China is ranked second in the list in terms of bots and origin of most attacks. It is ranked sixth in terms of phishing hosts and eighth in terms of spam zombies. China was at the same position last year also.
3. India
India is the world's third largest hotspot of malicious activity, according to Symantec's Internet Security Threat report. The top Web-based attack in 2009 was associated with malicious PDF activity, which accounted for 49 percent of the total attacks. The education sector accounted for 20 percent of data breaches that could lead to identity theft during this period, more than any other sector; this is a decrease from 27 percent in 2008, when it was also the highest ranked sector for data breaches. Symantec observed an average of 46,541 active bot-infected computers per day in 2009; this is a 38 percent decrease from the 75,158 per day average observed in 2008. The report pointed out that 'bot' or 'robot software' is being highly preferred in cyber-attacks.
 We can take following steps for prevention of hacking:
·         Harden our system by deactivating unnecessary software.
·         Installing Firewall on the system.
·         Not using same password for multiple account.
·         Using encrypted connection.
Conclusion    
Hence, from this research, it can be concluded that hacking is increasing day by day. US are leading in having hacking attacks whereas China and India are on second and third position. We know these countries are also leading in development in many fields. If such countries are not safe from hacking then no one else is safe which ultimately means we may be hacked at any time anywhere. So, we can call hacking as a leading crime.