logo
ADVERTISEMENT

OTIENO: Understanding computer system hacking to stay safe

There are various reasons why hacking is done.

image
by FRANCIS OTIENO

News28 July 2023 - 12:52
ADVERTISEMENT

In Summary


  • However, historically, state-sponsored hacking groups have targeted government agencies and critical infrastructures worldwide.
  • Fortunately, there are different ways of staying safe.
Most users do not understand the risks of falling into the hands of hackers, who may distribute deadly malware, plant sophisticated viruses or infected software on their mobile phones or computers without notice.

Computer system hacking refers to the unauthorized intrusion into computer networks, devices, or software to gain access to sensitive information, disrupt operations, or cause damage.

This note aims to provide an overview of how computer systems are hacked, the motivations behind hacking, benefits for hackers, forms of hacking, and specific instances involving hacking of FED institutions and governments.

Hacking is done for various reasons.

Data theft: Hackers aim to steal sensitive data such as personal information, financial records, and intellectual property to exploit or sell on the black market.

Financial gain: Some hackers seek monetary rewards by conducting ransomware attacks, where they encrypt essential data and demand payment for decryption keys.

Espionage: State-sponsored hackers and cyber-espionage groups infiltrate systems to gather intelligence or gain a competitive advantage.

Hacktivism: Hackers with ideological motivations target organizations or governments to raise awareness about social or political issues.

Vandalism: Some hackers engage in hacking for the thrill of causing disruption, defacing websites, or spreading malware.

Motivations for hackers

Motivations behind hacking can vary widely.

Financial incentives: Criminal hackers may view hacking as a lucrative way to make money through data theft, ransom demands, or selling stolen information.

Political or Ideological reasons: Hackers with specific beliefs or allegiances may target government institutions to advance their agendas or undermine a system they disagree with.

Challenge and curiosity: Some hackers are driven by the technical challenge and the satisfaction of breaking into secure systems.

Revenge: Disgruntled employees, customers, or individuals may resort to hacking as a means of retaliation.

Forms of hacking

Phishing: Sending deceptive emails or messages to trick users into revealing sensitive information like passwords or credit card details.

Malware: Distributing malicious software to compromise systems, such as viruses, Trojans, and ransomware.

SQL injection: Exploiting vulnerabilities in web applications to access databases and extract sensitive data.

Denial of Service (DoS) and Distributed Denial of Service (DDoS): Overloading a target system or network to make it inaccessible to legitimate users.

Zero-Day exploits: Leveraging undiscovered vulnerabilities in software before they are patched by developers.

Hacking of FED institutions and governments: Specific instances of hacking involving FED institutions and governments are often highly classified, and information might not be readily available in the public domain.

However, historically, state-sponsored hacking groups have targeted government agencies and critical infrastructures worldwide to gain intelligence, disrupt operations, or further their geopolitical interests.

How to prevent hacking

Strong security measures: Implement robust firewalls, encryption, and access controls to protect sensitive data and limit unauthorized access.

Regular updates and patching: Keep software and systems up-to-date to fix known vulnerabilities.

Employee education: Train employees to identify and avoid common security risks like phishing emails.

Multi-factor authentication: Enforce MFA to add an extra layer of security for user accounts.

Penetration testing: Regularly conduct ethical hacking tests to identify vulnerabilities before malicious hackers exploit them.

Monitoring and intrusion detection: Implement systems to monitor network activities for suspicious behaviour and quickly respond to potential threats.

Cybersecurity regulations: Governments can enforce strict cybersecurity regulations to ensure organizations adhere to essential security standards.

 

Francis Otieno of DewCIS Solutions Ltd, Nairobi.

ADVERTISEMENT