Wednesday, November 21, 2012

Computer Hacking - When is the System or Network at Risk of Being Hacked? - Computers - Security

Ethical hacker is an expert in hacking hired by corporate world especially using vast computer network for its operation. The purpose is to legally allow testing of the operation network of the company for any existing vulnerabilities. Basically ethical hacker shows which information in the computer network can be accessed by an illegal hacker; how the unauthorized retrieved information can be used by an illegal hacker against the interest of the company. Further the hired hacker should be able to provide tools to alert whenever successful or unsuccessful hacking bid occurs.

Company hiring hacker for the security of their computer system should explain in detail which information is crucial and where it has been kept. The hired hacker himself should have integrity beyond doubt since he will be allowed to access every part, sensitive as well as non-sensitive, of the company's database. Company should make sure to thoroughly go through the profile of the hacker before hiring him for his services.

There are definite signs of computer system being hacked. One of the most common sign is computer running very slow. Along with that the computer system's hard disk may have software which is unrecognizable. Now the question is how can illegal hacker accomplish his task of hacking?

For uploading and downloading of files, file transfer protocol shortly called FTP is in use for many years. Most of the commercial operating systems have FTP server, if this is not configured properly with firewall software for security then hacker will need little effort to hack the system. The FTP server can be used by hacker to store illegal software and files in your computer's disk space. The files usually stored are pirated movies, pornography, and cracked software. The script used in computer programming by hackers is not an easy one. It creates a directory structure in your system which stores their illegal data. The average user finds it too difficult to remove these scripts from their system as they have extended extensions very hard to identify.

In case users are fortunate enough to find that their system is hacked, they may get rid of hacker's script by wiping out the complete system and then again reinstalling it. Many times hacker use Internet Relay Chat (IRC). In many systems hackers install IRC relay agent so that information can be taken from host system without knowledge of owner. The only effect that can be experienced in the computer system is decrease in performance and internet access becoming slow.

Another option that hacker uses commonly for destructive motive is peer-to-peer file sharing software. Any computer system that utilizes peer-to-peer file sharing software for downloading of files from internet is liable to be hacked. The anti virus software installed in the system keep a check on any attempt of hacking and cautions the user whenever something non-standard is detected while downloading files in the system with the help of peer-to-peer services. Any organization allowing use of peer-to-peer file sharing software is putting their system and network at high risk.





No comments:

Post a Comment