The Art of exploring hackers various security breaches is termed as Hacking. Hacking is an unauthorized use of computer and network resources. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)
HISTORY OF HACKING – FACTS AND FIGURES
The Computer Crime & Abuse Report (India) 2001-02 has come out with startling data related to cyber crimes.(hacking) The report analyses 6,266 incidents of computer crime and abuse that affected 600 organizations spanning IT, manufacturing financial services, education, telecommunications, healthcare and other services sectors in India during this period. The report has been published by the Computer Emergency Response Team of India. From phone phhttps://nullcyberx.in/wp-admin/post.php?postreaks to Web attacks, hacking has been a part of computing for 40 years. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War-II have attracted huge attention. Development of Information Security Methods can be classified in following time domains:
- Before 20th Century
There was need from the early days of writing to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. Julius Caesar invented Caesar’s cipher in c50 B.C. to protect his secret messages from having read by his enemies. 2. 20th Century and on wards
World war- II mark the beginning of professional field of information security as many advancements were carried out during these days. At the end of 20th century and beginning of 21st century there was massive development in telecommunication infrastructure, computer hardware, software and data encryption. The electronic data processing came into reach of small business and home user. With the evolution of Internet these computers quickly become interconnected. Numerous occurrences of international terrorism(hacking) generated a need for better methods of protecting the computers and information which they store, transmit or process. The academic disciplines of computer security, information security and information assurance emerged with the common goals of ensuring the security and reliability of information systems. - 20th Century and on wards
World war- II mark the beginning of professional field of information security as many advancements were carried out during these days. At the end of 20th century and beginning of 21st century there was massive development in telecommunication infrastructure, computer hardware, software and data encryption. The electronic data processing came into reach of small business and home user. With the evolution of Internet these computers quickly become interconnected. Numerous occurrences of international terrorism generated a need for better methods of protecting the computers and information which they store, transmit or process. The academic disciplines of computer security, information security and information assurance emerged with the common goals of ensuring the security and reliability of information systems.
1960 s : The Dawn of Hacking
The first computer hackers emerged at MIT. They borrow their name from a term to describe members of a model train group at the school who “hack” the electric trains, tracks, and switch esto make them perform faster and differently. A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus.
1980 s : Hacker Message Boards and Groups
Phone phreaks begin to move into the realm of computer hacking, and the first electronic bulletin board systems (BBSs) spring up. The precursor to Usenet newsgroups and e-mail, the boards–with names such as Sherwood Forest and Catch-22–become the venue of choice for phreaks and hackers to gossip, trade tips, and share stolen computer passwords and credit card numbers.
1988 : The Morris Worm
Robert T. Morris, Jr., a graduate student at Cornell University and son of a chief scientist at adivision of the National Security Agency, launches a self-replicating wormon the government’s ARPAnet (precursor to the Internet) to test its effect on UNIX systems. Robert T. Morris, Jr., a graduate student at Cornell University and son of a chief scientist at adivision of the National Security Agency, launches a self-replicating wormon the government’s ARPA net (precursor to the Internet) to test its effect on UNIX systems.
1995 : The Mitnick Take down
Serial cyber trespasser Kevin Mitnick is captured by federal agents and charged with stealing 20,000 credit card numbers. He’s kept in prison for four years without a trial and becomes acausecélèbre in the hacking underground. After pleading guilty to seven charges at his trial in March 1999, he’s eventually sentenced to little more than the time he had already served while he awaited a trial. Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
1998 : The Cult of Hacking and the Israeli Connection
The hacking group Cult of the Dead Cow releases its Trojan horse program, Back Orifice–a powerful hacking tool–at Def Con. Once a hacker installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine.
2000 : Service Denied
In one of the biggest denial-of-service attacks to date, hackers launch attacks against eBay, Yahoo, Amazon, and others. Activists in Pakistan and the Middle East deface Web sites belongingtotheIndian and Israeli governments to protest oppression in Kashmir and Palestine.
2001 : DNS Attack
Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft’s Websites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.