0% found this document useful (0 votes)
36 views12 pages

Assignment On IPR, IT LAW and INTERNATIONAL ORGANISATION

The document discusses hacking as a tool to commit cyber crimes. It provides an introduction to hacking, the history of hacking, techniques used by hackers, reasons for hacking, impacts of hacking, and prevention of hacking. It also includes an index and bibliography.

Uploaded by

Sarthak Jaiswal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views12 pages

Assignment On IPR, IT LAW and INTERNATIONAL ORGANISATION

The document discusses hacking as a tool to commit cyber crimes. It provides an introduction to hacking, the history of hacking, techniques used by hackers, reasons for hacking, impacts of hacking, and prevention of hacking. It also includes an index and bibliography.

Uploaded by

Sarthak Jaiswal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

B.A.LL.B. (Hons.

)
Year -4th
Semester -8th
Session : 2023-24

Subject: INFORMATION TECHNOLOGY LAW

Topic: HACKING AS A TOOL TO COMMIT


CYBER CRIME

SUBMITTED TO :- SUBMITTED BY:-

Miss Jagriti Vijay Shikha


Roll.no:- 55
Acknowledgement

I would like to express my special thanks of gratitude to my respected teacher Miss Jagriti
Vijay who gave me the golden opportunity to do this wonderful project on the topic
“Hacking as a tool to commit cyber crime” which also helped me in doing a lot of
Research and I came to know about so many new things I am really thankful to them.

Secondly I would also like to thank my parents and friends who helped me a lot in finalizing
this project within the limited time frame.

2
Index

S.No. Topics Page No.

1 4
Introduction

2 5
History of Hacking

3 6
Technique of Hacking

4 8
Reasons of Hacking

5 9
Impact of Hacking

6 10
Prevention of Hacking

7 11
Conclusion

8 12
Bibliography

3
Introduction

Hacking in cyber security refers to the misuse of devices like computers, smartphones,
tablets, and networks to cause damage to or corrupt systems, gather information on users,
steal data and documents, or disrupt data-related activity. A commonly used hacking
definition is the act of compromising digital devices and networks through unauthorized
access to an account or computer system. Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by cyber criminals.

A traditional view of hackers who is highly skilled in coding and modifying computer
software and hardware systems. But this narrow view does not cover the true technical nature
of hacking. Hackers are increasingly growing in sophistication, using stealthy attack methods
designed to go completely unnoticed by cyber security software and IT teams. They are also
highly skilled in creating attack vectors that trick users into opening malicious attachments or
links and freely giving up their sensitive personal data.

As a result, modern-day hacking involves far more than just an angry kid in their bedroom. It
is a multibillion-dollar industry with extremely sophisticated and successful techniques.

Types of Hackers

1. White Hat Hackers


White hat hackers, also known as ethical hackers, use their technical expertise to keep
systems safe. The scope of work usually entails finding and fixing the vulnerabilities in the
system by developing programs to detect the attacks.

2. Black Hat Hackers


Black Hat Hackers are known to break into a system by exploiting its vulnerabilities. They
hack to obtain information illegally using numerous techniques including phishing,
distributing malware and viruses, using distributed denial of service (DDoS) attacks to crash
websites and selling others’ financial and personal information. The activities of Black Hat
Hackers are illegal.

4
History of Hacking

The history of hacking is a fascinating journey that spans several decades and has evolved
alongside advancements in technology.

 1960s-1970s: The origins of hacking can be traced back to the early days of
computing when computer enthusiasts at MIT and other institutions began exploring
the capabilities of mainframe computers. These early hackers often referred to as
"phone phreaks," manipulated telephone systems to make free long-distance calls and
explored the inner workings of computer systems out of curiosity rather than malice.

 1980s: Hacking gained more attention and notoriety in the 1980s with the advent of
personal computers and the spread of computer networks. One of the most famous
hackers of this era was Kevin Mitnick, who gained unauthorized access to computer
systems and became known for his social engineering skills.

 1980s-1990s: The rise of the internet led to an increase in hacking activity, with
hackers targeting government, military, and corporate systems. Notable incidents
during this time include the Morris Worm, one of the first computer worms to spread
extensively across the internet, and the hacking of NASA and Pentagon systems by
groups like the Legion of Doom and the Chaos Computer Club.

 Late 1990s-2000s: The late 1990s and early 2000s saw a rise in high-profile hacking
incidents, including attacks on major corporations like Microsoft and Yahoo. The
term "hacktivism" emerged to describe hacking for political or social causes, with
groups like Anonymous gaining attention for their cyber-attacks on government and
corporate websites.

 2000s-present: Hacking has continued to evolve with the emergence of new


technologies such as mobile devices, cloud computing, and the Internet of Things
(IoT). Cybercrime has become increasingly sophisticated, with hackers using
techniques like phishing, malware, and ransomware to target individuals, businesses,
and organizations.

5
Techniques of hacking

1. Phishing – This simply means duplicating the original website to gain access to the
users’ information like account password, credit card details etc. It is the most
common hacking technique in which the hackers will either send you a fake message
with a fake invoice or ask to confirm some personal information or entice the person
with some free stuff.

2. Virus attack – By this method of hacking, the hackers release the virus into the files
of the website which can corrupt or destroy the important information stored in our
computer if they are downloaded or get inside our computer system.

3. UI redress – In this method, a fake user interface is created by which when the user
clicks on it, it redirects them to another vulnerable website. For instance, if we have to
download a song, as soon as we click on the “download” tab, a new page is redirected
which is usually a fake website.

4. Cookie theft – Sometimes, the website containing information about the users in the
form of cookies is hacked using special tools. These cookies can be decrypted and
read to reveal one’s identity which can be further used to impersonate the person
online

5. DNS spoofing – The cache data of a website which the user might have forgotten is
used by hackers to gather information about users. Here, a user is forced to navigate
to a fake website disguised to look like a real one, with the intention of diverting
traffic or stealing the credentials of the users.

6. Bait and Switch - The bait and switch hacking technique obtains system data by
hijacking an authentic paid advertising space. Through bait and switch, users believe
they are clicking an authentic ad, but the ad has been purchased by attackers and
actually leads the user to a bad link. When users land on this malicious website,
malware is downloaded into their system and the hacker gains access to their sensitive
data.

6
 What Devices Are Most Vulnerable to Hackers
Many different devices are vulnerable to cyber hackers, but some of the most common
include:

1. Computers – Common computer systems like laptops and PCs are prime targets for
hackers due to the vast amount of personal and sensitive information they contain,
such as financial data, login credentials, and personal documents. Computer systems
are particular targets of cyber attacks on a commercial and enterprise level, given the
value of assets associated with them.

2. Mobile Devices – Mobile devices such as smartphones and tablets are also at risk of
being hacked, as they often store sensitive information, including personal photos,
messages, and emails. They can be particularly susceptible to hackers when using
public Wi-Fi and shared networks.

3. IoT Devices – Internet of Things (IoT) devices such as smart home appliances,
security cameras, and even medical devices are common targets for hackers. These
devices are often poorly secured and typically hacked to gain access to personal
information or even to control the device remotely.

4. Network Routers – Network routers, responsible for distributing Wi-Fi signals, are
often targeted by hackers. Hacked routers provide a means to gain access to entire
networks of devices, enabling hackers to access sensitive data and valuable digital
assets.

5. ATM Machines – Bank ATMs are also vulnerable targets to hackers motivated by
financial incentives, as many ATMs often operate on outdated software and may be
connected to an unsecured network. Flaws in card reader technology can also be used
as a means of cyber hacking.

7
Reasons of Hacking

A device may get hacked for a number of reasons affecting an individual’s use of their
computer or phone where their data can get compromised and used by cybercriminals. Some
of the most common reasons for hacking are:

1. Financial Gain - The most obvious and common motivations for hacking are to
acquire money, gain a competitive advantage, or disrupt an organization.

2. Revenge - Someone might hack into a computer to exact revenge. They may take
someone’s personal data and share it with the purpose of instilling embarrassment
and/or fear in a victim.

3. Blackmail - Cybercriminals might use information they find while hacking or using
the threat of hacking into someone else’s computer to extort or blackmail an
individual into doing things such as; giving the hacker money, sending or publishing
compromising or sexually explicit images (sextortion) or in some cases, breaching the
law.

4. Gain access to personal data - Because most businesses will store the data of
customers and/or clientele, cybercriminals can use this data to impersonate
individuals, extort from them directly or distribute their information in the form of
doxing.

5. Curiosity and Learning - Some hackers simply enjoy the intellectual challenge of
finding and exploiting security weaknesses. While these hackers can seek ethical
hacking as a profession, helping businesses discover flaws in their security systems
and personnel, most of these individuals instead choose to act for notoriety or
personal pride.

6. Hacktivism - It is a blend of the words “activism” and “hacking” and describes when
someone hacks for social or political reasons. These hacktivists gain access to an
organization’s systems to deface its website, redirect traffic to another site or use
whistleblowing tactics to reveal secrets or data.

8
Impact of Hacking

Hackers can have significant effects and consequential impacts on individuals, businesses,
and even entire countries, regions, and municipalities. Here are some of the most common
effects of hacking at large.

1. Financial Loss – Hackers that breach bank accounts can steal money or commit
fraud, leading to substantial financial loss for individuals or businesses

2. Identity Theft – Hackers have been known to hijack sensitive personal information,
such as birth dates, Social Security numbers, addresses, and credit card numbers, to
maliciously commit various cyber crimes that fall under the category of identity theft.

3. Data Breaches – Data breaches are one of the most detrimental forms of hacking,
especially when data gets leaked to malicious parties. With these attacks, hackers can
gain unauthorised access to confidential or sensitive data, like financial records,
medical records, or intellectual property.

4. Disruption of Services – In a hacked computer or network, the immediate outcome


disrupts the normal function of websites, computer systems, or entire networks. Not
only does this disrupt standard operations, but it can damage critical infrastructure.

5. Cyber Espionage – Hackers can steal valuable information, such as government data,
confidential information, or sensitive trade secrets, to gain a competitive advantage
with political interests and foreign affairs or by putting national security at risk.

6. Spread of Malware – The creation and distribution of malware, such as computer


viruses or ransomware, are common ways for hackers to infect and damage computer
systems, steal data, or demand ransom payments from organisations or individuals.

The impact of hackers can range from minor inconveniences to major disruptions. That’s why
individuals and organisations must take steps to prevent and mitigate the effects of hacking.

9
Prevention of Hacking

There are many ways that individuals and organisations can effectively protect their digital
assets from hackers. For individuals looking to prevent hackers from hacking personal
computers and devices, several cyber security best practices can be employed.

1. Maintain strong, complex passwords – the longer a password is, the better a
security will be. Whenever possible, use at least 16 characters.

2. Install antivirus and anti-malware software – Software programmes that detect and
remove viruses and malware are essential in protecting your computer system and
ensuring your data is safe.

3. Stay alert about suspicious emails – Avoid clicking questionable links or opening
attachments to emails you don’t recognise.

4. Avoid public Wi-Fi networks for personal or financial data – Never use public
Wi-Fi to access sensitive personal accounts, like bank accounts, online wallets, or
trade accounts where financial exchanges occur.

5. Create a cyber security awareness training programme – Critical for all types of
organisations, cyber security awareness training helps equip employees with the
awareness and understanding to effectively identify potential threats and attacks.

6. Educate remote employees on cyber security policies – With remote and hybrid
working dynamics now the new normal, employees working from home need as much
awareness and understanding of cyber security best practices as those in the office.

10
Conclusion

Hacking has grown from a hobby of curious computer lovers to a serious issue affecting
everyone's digital lives. As technology advanced, some hackers are motivated by curiosity or
a desire to make things better, while others are out to steal information, cause chaos, or make
money.

Over time, hacking has led to major incidents, like stealing personal information, spreading
viruses, and disrupting important services. Governments, companies, and individuals are all
at risk. To protect against hacking, cyber security measures are essential. These include
strong passwords, antivirus software, and regular updates to computer systems. It's also
important to be cautious online, avoiding suspicious emails or websites that could be traps.

As technology continues to evolve, so will hacking. Staying safe means staying informed and
being proactive about cyber security.

11
Bibliography

 https://www.kaspersky.com/resource-center/definitions/what-is-
hacking#:~:text=Hacking%20is%20the%20act%20of,to%20its%20association%20wi
th%20cybercrime.
 https://www.fraud.com/post/what-is-hacking
 https://www.fortinet.com/resources/cyberglossary/what-is-hacking
 https://www.geeksforgeeks.org/what-is-hacking-definition-types-identification-safety/
 https://www.proofpoint.com/us/threat-reference/hacking
 https://blog.ipleaders.in/all-you-need-to-know-about-hacking/

12

You might also like