Network Security

As technology advances, so does network perpetrators... Thus, prevention is always better than cure.

Wednesday, August 13, 2008

Modus Operandi of Hacking

After reading the article, we all realized that hackers also have their own "identities" within themselves. Not all hackers have the sole purpose of getting money or gaining personal glory. Most of them also do these things for the sake of having fun, a way to relieve themselves and to identify their "belongingness". Aside from this, we found out too that not all hackers are crackers and not all crackers are hackers. Hackers mostly intrude in the system to gain information while crackers mostly do their thing for their benefit without even thinking of the consequences of their actions. Furthermore, ethics also exist in the world of cybercrime, because most of them know their limitations and capabilities, as such the existence of their modus operandi, ritual and signature. These things could either help them be known, and let their computer prowess be exposed.

In addition to this, hacking really is a very extensive and time-consuming, mind-bending, patience-needing activity because hackers do need extensive research activities about their target as well as knowing how to intrude on the system and to reach their target. Hacking is a very tedious activity because everything that is involved in it needs to be perfect to enable the hacker to reach its target successfully, hide their identities and escape from the "crime scene".

As future Network Administrators, having read this article helps us realize the real thing. If hacking is tedious, how much more, we, the network administrators deal with this "perpetrators". Like in a game of chess, one has to think 3-4 moves before the opponent wins game. That is why, we have to predict the next action of the hacker before it gets worse.