Assignment On IPR, IT LAW and INTERNATIONAL ORGANISATION
Assignment On IPR, IT LAW and INTERNATIONAL ORGANISATION
)
Year -4th
Semester -8th
Session : 2023-24
I would like to express my special thanks of gratitude to my respected teacher Miss Jagriti
Vijay who gave me the golden opportunity to do this wonderful project on the topic
“Hacking as a tool to commit cyber crime” which also helped me in doing a lot of
Research and I came to know about so many new things I am really thankful to them.
Secondly I would also like to thank my parents and friends who helped me a lot in finalizing
this project within the limited time frame.
2
Index
1 4
Introduction
2 5
History of Hacking
3 6
Technique of Hacking
4 8
Reasons of Hacking
5 9
Impact of Hacking
6 10
Prevention of Hacking
7 11
Conclusion
8 12
Bibliography
3
Introduction
Hacking in cyber security refers to the misuse of devices like computers, smartphones,
tablets, and networks to cause damage to or corrupt systems, gather information on users,
steal data and documents, or disrupt data-related activity. A commonly used hacking
definition is the act of compromising digital devices and networks through unauthorized
access to an account or computer system. Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by cyber criminals.
A traditional view of hackers who is highly skilled in coding and modifying computer
software and hardware systems. But this narrow view does not cover the true technical nature
of hacking. Hackers are increasingly growing in sophistication, using stealthy attack methods
designed to go completely unnoticed by cyber security software and IT teams. They are also
highly skilled in creating attack vectors that trick users into opening malicious attachments or
links and freely giving up their sensitive personal data.
As a result, modern-day hacking involves far more than just an angry kid in their bedroom. It
is a multibillion-dollar industry with extremely sophisticated and successful techniques.
Types of Hackers
4
History of Hacking
The history of hacking is a fascinating journey that spans several decades and has evolved
alongside advancements in technology.
1960s-1970s: The origins of hacking can be traced back to the early days of
computing when computer enthusiasts at MIT and other institutions began exploring
the capabilities of mainframe computers. These early hackers often referred to as
"phone phreaks," manipulated telephone systems to make free long-distance calls and
explored the inner workings of computer systems out of curiosity rather than malice.
1980s: Hacking gained more attention and notoriety in the 1980s with the advent of
personal computers and the spread of computer networks. One of the most famous
hackers of this era was Kevin Mitnick, who gained unauthorized access to computer
systems and became known for his social engineering skills.
1980s-1990s: The rise of the internet led to an increase in hacking activity, with
hackers targeting government, military, and corporate systems. Notable incidents
during this time include the Morris Worm, one of the first computer worms to spread
extensively across the internet, and the hacking of NASA and Pentagon systems by
groups like the Legion of Doom and the Chaos Computer Club.
Late 1990s-2000s: The late 1990s and early 2000s saw a rise in high-profile hacking
incidents, including attacks on major corporations like Microsoft and Yahoo. The
term "hacktivism" emerged to describe hacking for political or social causes, with
groups like Anonymous gaining attention for their cyber-attacks on government and
corporate websites.
5
Techniques of hacking
1. Phishing – This simply means duplicating the original website to gain access to the
users’ information like account password, credit card details etc. It is the most
common hacking technique in which the hackers will either send you a fake message
with a fake invoice or ask to confirm some personal information or entice the person
with some free stuff.
2. Virus attack – By this method of hacking, the hackers release the virus into the files
of the website which can corrupt or destroy the important information stored in our
computer if they are downloaded or get inside our computer system.
3. UI redress – In this method, a fake user interface is created by which when the user
clicks on it, it redirects them to another vulnerable website. For instance, if we have to
download a song, as soon as we click on the “download” tab, a new page is redirected
which is usually a fake website.
4. Cookie theft – Sometimes, the website containing information about the users in the
form of cookies is hacked using special tools. These cookies can be decrypted and
read to reveal one’s identity which can be further used to impersonate the person
online
5. DNS spoofing – The cache data of a website which the user might have forgotten is
used by hackers to gather information about users. Here, a user is forced to navigate
to a fake website disguised to look like a real one, with the intention of diverting
traffic or stealing the credentials of the users.
6. Bait and Switch - The bait and switch hacking technique obtains system data by
hijacking an authentic paid advertising space. Through bait and switch, users believe
they are clicking an authentic ad, but the ad has been purchased by attackers and
actually leads the user to a bad link. When users land on this malicious website,
malware is downloaded into their system and the hacker gains access to their sensitive
data.
6
What Devices Are Most Vulnerable to Hackers
Many different devices are vulnerable to cyber hackers, but some of the most common
include:
1. Computers – Common computer systems like laptops and PCs are prime targets for
hackers due to the vast amount of personal and sensitive information they contain,
such as financial data, login credentials, and personal documents. Computer systems
are particular targets of cyber attacks on a commercial and enterprise level, given the
value of assets associated with them.
2. Mobile Devices – Mobile devices such as smartphones and tablets are also at risk of
being hacked, as they often store sensitive information, including personal photos,
messages, and emails. They can be particularly susceptible to hackers when using
public Wi-Fi and shared networks.
3. IoT Devices – Internet of Things (IoT) devices such as smart home appliances,
security cameras, and even medical devices are common targets for hackers. These
devices are often poorly secured and typically hacked to gain access to personal
information or even to control the device remotely.
4. Network Routers – Network routers, responsible for distributing Wi-Fi signals, are
often targeted by hackers. Hacked routers provide a means to gain access to entire
networks of devices, enabling hackers to access sensitive data and valuable digital
assets.
5. ATM Machines – Bank ATMs are also vulnerable targets to hackers motivated by
financial incentives, as many ATMs often operate on outdated software and may be
connected to an unsecured network. Flaws in card reader technology can also be used
as a means of cyber hacking.
7
Reasons of Hacking
A device may get hacked for a number of reasons affecting an individual’s use of their
computer or phone where their data can get compromised and used by cybercriminals. Some
of the most common reasons for hacking are:
1. Financial Gain - The most obvious and common motivations for hacking are to
acquire money, gain a competitive advantage, or disrupt an organization.
2. Revenge - Someone might hack into a computer to exact revenge. They may take
someone’s personal data and share it with the purpose of instilling embarrassment
and/or fear in a victim.
3. Blackmail - Cybercriminals might use information they find while hacking or using
the threat of hacking into someone else’s computer to extort or blackmail an
individual into doing things such as; giving the hacker money, sending or publishing
compromising or sexually explicit images (sextortion) or in some cases, breaching the
law.
4. Gain access to personal data - Because most businesses will store the data of
customers and/or clientele, cybercriminals can use this data to impersonate
individuals, extort from them directly or distribute their information in the form of
doxing.
5. Curiosity and Learning - Some hackers simply enjoy the intellectual challenge of
finding and exploiting security weaknesses. While these hackers can seek ethical
hacking as a profession, helping businesses discover flaws in their security systems
and personnel, most of these individuals instead choose to act for notoriety or
personal pride.
6. Hacktivism - It is a blend of the words “activism” and “hacking” and describes when
someone hacks for social or political reasons. These hacktivists gain access to an
organization’s systems to deface its website, redirect traffic to another site or use
whistleblowing tactics to reveal secrets or data.
8
Impact of Hacking
Hackers can have significant effects and consequential impacts on individuals, businesses,
and even entire countries, regions, and municipalities. Here are some of the most common
effects of hacking at large.
1. Financial Loss – Hackers that breach bank accounts can steal money or commit
fraud, leading to substantial financial loss for individuals or businesses
2. Identity Theft – Hackers have been known to hijack sensitive personal information,
such as birth dates, Social Security numbers, addresses, and credit card numbers, to
maliciously commit various cyber crimes that fall under the category of identity theft.
3. Data Breaches – Data breaches are one of the most detrimental forms of hacking,
especially when data gets leaked to malicious parties. With these attacks, hackers can
gain unauthorised access to confidential or sensitive data, like financial records,
medical records, or intellectual property.
5. Cyber Espionage – Hackers can steal valuable information, such as government data,
confidential information, or sensitive trade secrets, to gain a competitive advantage
with political interests and foreign affairs or by putting national security at risk.
The impact of hackers can range from minor inconveniences to major disruptions. That’s why
individuals and organisations must take steps to prevent and mitigate the effects of hacking.
9
Prevention of Hacking
There are many ways that individuals and organisations can effectively protect their digital
assets from hackers. For individuals looking to prevent hackers from hacking personal
computers and devices, several cyber security best practices can be employed.
1. Maintain strong, complex passwords – the longer a password is, the better a
security will be. Whenever possible, use at least 16 characters.
2. Install antivirus and anti-malware software – Software programmes that detect and
remove viruses and malware are essential in protecting your computer system and
ensuring your data is safe.
3. Stay alert about suspicious emails – Avoid clicking questionable links or opening
attachments to emails you don’t recognise.
4. Avoid public Wi-Fi networks for personal or financial data – Never use public
Wi-Fi to access sensitive personal accounts, like bank accounts, online wallets, or
trade accounts where financial exchanges occur.
5. Create a cyber security awareness training programme – Critical for all types of
organisations, cyber security awareness training helps equip employees with the
awareness and understanding to effectively identify potential threats and attacks.
6. Educate remote employees on cyber security policies – With remote and hybrid
working dynamics now the new normal, employees working from home need as much
awareness and understanding of cyber security best practices as those in the office.
10
Conclusion
Hacking has grown from a hobby of curious computer lovers to a serious issue affecting
everyone's digital lives. As technology advanced, some hackers are motivated by curiosity or
a desire to make things better, while others are out to steal information, cause chaos, or make
money.
Over time, hacking has led to major incidents, like stealing personal information, spreading
viruses, and disrupting important services. Governments, companies, and individuals are all
at risk. To protect against hacking, cyber security measures are essential. These include
strong passwords, antivirus software, and regular updates to computer systems. It's also
important to be cautious online, avoiding suspicious emails or websites that could be traps.
As technology continues to evolve, so will hacking. Staying safe means staying informed and
being proactive about cyber security.
11
Bibliography
https://www.kaspersky.com/resource-center/definitions/what-is-
hacking#:~:text=Hacking%20is%20the%20act%20of,to%20its%20association%20wi
th%20cybercrime.
https://www.fraud.com/post/what-is-hacking
https://www.fortinet.com/resources/cyberglossary/what-is-hacking
https://www.geeksforgeeks.org/what-is-hacking-definition-types-identification-safety/
https://www.proofpoint.com/us/threat-reference/hacking
https://blog.ipleaders.in/all-you-need-to-know-about-hacking/
12