kids encyclopedia robot

Security hacker facts for kids

Kids Encyclopedia Facts

A security hacker is a person who explores how computer systems and networks work. They look for ways to get past security measures or find weak spots. Sometimes, they do this to help make systems safer. Other times, they might do it for fun, a challenge, or to gather information.

The word "hacker" can be a bit confusing. Some people use it to mean someone who is really good with computers and networks. They might call people who break into computers for bad reasons "crackers." But often, when people talk about "hackers," they mean those who try to get into computer systems without permission. This article will explain the different types of hackers.

The History of Hacking

Stering
Bruce Sterling, a writer who wrote about hackers.

Early Days: 1960s to 1980s

The idea of hacking started to grow in the 1960s. It was linked to "phreaking," which was about exploring phone systems. Later, in the 1980s, it became part of the computer world through early online communities called BBSs.

In the early 1980s, the word "hacker" began appearing in public. The 1982 movie Tron showed a character trying to get into a computer system. This helped introduce the idea of hacking to more people.

A year later, in 1983, the movie WarGames came out. It showed a teenager accidentally breaking into a military computer. This made many people worry about computer security. Around the same time, a group of teenagers called The 414s actually broke into several important computer systems. This event got a lot of media attention.

Because of these events, new laws were created to stop computer crimes. This led to different types of hackers trying to define themselves. They wanted to show if their actions were legal or illegal. This is where terms like "white hat" and "black hat" hackers began to be used.

Later, in 1988, a famous computer program called the Morris worm spread widely. This event also made the public think more about hackers as people who cause trouble.

Different Types of Hackers

Hackers can have many different goals. Some want to help, while others want to cause harm. Because of this, people have created different names to describe them.

What is a Cracker?

The term "cracker" is often used for hackers who break into computer systems to cause damage or steal information. They do this for bad reasons, like destroying data or committing other crimes. It's important to remember that these actions are illegal.

White Hat Hackers: The Good Guys

A white hat hacker is an ethical hacker. They use their skills to help make computer systems safer. They might test a system's security to find weak spots before bad hackers do. They work for companies or clients to improve defenses. White hat hackers follow a code of conduct. They believe it's wrong to break into computers without permission, but they enjoy finding security flaws in a legal and ethical way.

Black Hat Hackers: The Bad Guys

A black hat hacker breaks into computer systems for harmful reasons. They might do it to cause damage, steal money, or gain personal benefits. These are the hackers often shown in movies as criminals. Their actions are illegal and can cause serious problems for individuals and organizations.

Grey Hat Hackers: In Between

A grey hat hacker is somewhere between a white hat and a black hat. They might break into a system without permission, but their goal isn't always to cause harm. For example, they might find a security flaw and tell the system owner about it. Sometimes, they might even offer to fix it for a fee. Even if their intentions aren't fully malicious, getting into a system without permission is still against the rules and can be illegal.

Elite Hackers: The Most Skilled

"Elite" hackers are known as the most skilled and talented in the hacking world. They are often the first to discover new ways to get past security. These new methods might then be shared among other very skilled hackers.

Script Kiddies: The Beginners

A script kiddie is a hacker who doesn't have much skill or understanding. They use ready-made tools or "scripts" created by others to break into systems. They often don't understand how these tools work. The name "script kiddie" suggests they are like kids playing with tools they don't fully grasp.

Neophytes: The Newbies

A neophyte, also called a "newbie" or "noob," is someone who is completely new to hacking. They have very little knowledge or experience with technology or hacking techniques.

Blue Hat Hackers: The Testers

A blue hat hacker is someone hired to test a computer system before it is launched. Their job is to find any weak spots or "bugs" so they can be fixed. This helps make sure the system is secure before it goes live.

Hacktivists: Hacking for a Cause

A hacktivist is a hacker who uses technology to share a message. This message might be about social issues, politics, or other ideas. They might do things like change a website's appearance or try to make a website unavailable to get attention for their cause.

Nation State Hackers: Government Operations

These are hackers who work for governments. They might be part of intelligence agencies or military groups. Their goal is often to gather information or conduct operations for their country.

How Hackers Attack Systems

Hackers often follow a few steps when trying to get into a computer system. First, they gather information about their target. Then, they look for weak spots. Finally, they try to use those weaknesses to get in.

Common Hacking Tools and Methods

Hackers use many different tools and techniques. Here are some common ones:

Security Exploits

A security exploit is a special program that takes advantage of a known weakness in a system. For example, some exploits target mistakes in how websites are built. This can allow hackers to gain access or control.

Vulnerability Scanners

A vulnerability scanner is a tool that quickly checks computers on a network for known weaknesses. Hackers also use "port scanners." These tools look for "open doors" on a computer that might allow access. Think of a firewall as a locked door that tries to keep intruders out.

Finding Weaknesses Manually

Some hackers try to find weaknesses by looking at a system's code themselves. They might try to understand how a program works to find hidden flaws. Experienced hackers can often spot common problems.

Password Guessing (Brute-Force Attacks)

A Brute-force attack is like trying every possible password combination until one works. For short passwords, this can be very fast. For longer, more complex passwords, hackers might use a "dictionary attack," which tries common words and phrases.

Password Cracking

Password cracking is about figuring out passwords that are stored or sent by a computer system. This can involve trying many guesses or using lists of common passwords.

Packet Analyzers

A packet analyzer is a tool that captures data as it travels across a network. This can sometimes allow hackers to see sensitive information, like passwords, that are being sent.

Spoofing Attacks (Phishing)

A spoofing attack is when a hacker pretends to be someone or something else. For example, they might create a fake website that looks like a real one. Their goal is to trick people into giving away private information, like usernames and passwords. This is often called "phishing."

Rootkits

A rootkit is a hidden program that helps a hacker control a computer system without being easily detected. It can hide itself and other malicious programs, making it hard to remove.

Social Engineering

Social engineering is a clever trick where hackers try to get information from people. Instead of attacking computers directly, they trick people into giving them access or details. For example, a hacker might pretend to be a user who forgot their password. They might call a help desk and try to convince the person on the phone to give them information.

Hackers using social engineering often study how a company works. They might pretend to be an angry boss to scare someone into helping them. Or, they might act very helpful to get someone to trust them. They might even use names of real employees they found online. The goal is always to trick someone into revealing important information, like a password. People are often the weakest link in security, as no computer program can stop someone from giving away a secret.

Trojan Horses

A Trojan horse is a program that looks harmless but actually hides something bad. It's like the famous wooden horse from the Trojan War. It tricks you into letting it onto your computer, and then it can create a secret "back door" for the hacker to get in later.

Computer Viruses

A virus is a program that can make copies of itself and spread to other programs or documents. It acts a bit like a biological virus. Most computer viruses are designed to cause harm.

Computer Worms

A worm is similar to a virus because it also copies itself. However, a worm can spread across computer networks on its own, without needing a user to open a specific program. It doesn't need to attach itself to another program to spread.

Keystroke Logging

A keylogger is a tool that records every key you type on a computer. This can be used by hackers to steal private information, like passwords. Some keyloggers try to hide themselves. However, some businesses use keyloggers for legal reasons, like checking for fraud.

Attack Patterns

Attack patterns are like step-by-step guides that show how a hacker might attack a system. They are used to test security or find weak spots. They can also help people learn how to prevent certain attacks.

Famous Security Hackers

Here are some individuals known for their work in computer security and hacking:

  • Andrew Auernheimer is a grey hat hacker. His group, Goatse Security, found a weakness in AT&T's iPad security. His actions led to legal consequences.
  • Dan Kaminsky was an expert in DNS. He found many flaws in this system and looked into security problems with Sony in 2005. He also spoke to the United States Senate about technology.
  • Ed Cummings (also known as Bernie S) is a long-time writer for 2600: The Hacker Quarterly. He was involved in legal cases related to technology.
  • Eric Corley (also known as Emmanuel Goldstein) is the publisher of 2600: The Hacker Quarterly. He also started the Hackers on Planet Earth (HOPE) conferences. He has been part of the hacker community since the late 1970s.
  • Susan Headley (also known as Susan Thunder) was an American hacker known for her skills in social engineering. She was involved with Kevin Mitnick in early hacking activities.
  • Gary McKinnon is a Scottish hacker who faced legal issues regarding computer access. His case received a lot of attention in the UK.
  • Gordon Lyon, known as Fyodor, created the Nmap Security Scanner. He has also written many books and websites about network security.
  • Guccifer 2.0 claimed to have accessed the computer network of the Democratic National Committee (DNC).
  • Jacob Appelbaum is a security researcher and developer for the Tor project. He speaks about using Tor for online privacy and fighting censorship.
  • Joanna Rutkowska is a Polish computer security researcher. She developed the Blue Pill rootkit and Qubes OS.
  • Jude Milhon (known as St. Jude) was an American hacker and activist. She helped create Community Memory, one of the first public computer bulletin board systems.
  • Kevin Mitnick was a computer security consultant and writer. He was once a very well-known computer criminal in United States history.
  • Len Sassaman was a Belgian computer programmer and privacy advocate.
  • Meredith L. Patterson is a technologist and biohacker. She has shared her research at many international security and hacker conferences.
  • Kimberley Vanvaeck (known as Gigabyte) is a Belgian hacker. She is known for writing the first computer virus in the C# programming language.
  • Michał Zalewski (lcamtuf) is a well-known security researcher.
  • Solar Designer is the name used by the founder of the Openwall Project.
  • Kane Gamble gained access to sensitive information from high-profile government officials in the U.S. His actions led to legal consequences.

Legal Consequences for Malicious Hacking

Malicious hacking is illegal in most countries and can lead to serious legal problems. Laws are in place to protect computer systems and data from unauthorized access and damage.

Laws Against Hacking

Around the world, laws make it a crime to break into computer systems without permission. These laws aim to stop people from stealing information, damaging systems, or causing other harm. The punishments for these crimes can include fines or even time in jail.

For example, in the United States, the Computer Fraud and Abuse Act makes it illegal to access "protected computers" without permission. These protected computers include those used by banks or the government, or any computer used in business that crosses state lines. The punishment depends on how serious the crime was.

Law enforcement agencies, like the FBI, work to catch hackers and recover stolen money or data.

See also

  • Cracking of wireless networks
  • Cyber spying
  • Cyber Storm Exercise
  • Cybercrime
  • Government hacking
  • Hacker culture
  • Hacker (expert)
  • Hacker Manifesto
  • IT risk
  • Mathematical beauty
  • Metasploit Project
  • Penetration test
  • Technology assessment
  • Vulnerability (computing)
kids search engine
Security hacker Facts for Kids. Kiddle Encyclopedia.