By: Varun Arora, BCA 6th Sem, 2nd Shift
Over the past few years, there has been a huge advancement in technology. Many inventions have been made over the last decade. Everyday, we are able to see some new change in technology and the mindset of the people. As more and more people are moving towards the digital society, so its pros and cons are coming every day with some new technique. As we know that a coin has 2 faces; when we talk about its pros, we also talk about its cons. One of them is the hacking which is spreading rapidly these days. Another term associated with hacking is cracking. Both the terms are used interchangeably sometimes. Hacking has affected a lot in the digital world. Its impact has made digital technology to change itself or has asked some difficult questions related to the security in the digital world.
Hacking is generally done for the purpose of making theft or breach in the security without authorized access with malicious intent whereas cracking is entering the network without authorised access or change in some source code so that it makes difficult for the regular operation to be done. Both of these terms have more or less an equal impact on the digital world. In the faster-growing countries like India, this has become a serious issue for the security for digital usage. There are different techniques used in hacking, like one of them is Dictionary Attack- in this type of attack in hackers try to get the password right by typing it many times as if he/she is lucky enough. In this, there is a file which works as a dictionary. Brute Force- It can be termed as a higher version of the dictionary attack. In this, the software that is used will try every possible combination to determine the password until the password is found. Phishing-It is done by making a fake call, fake emails, fake apps, etc. It simply asks you to tell your ID and password and when you enter them, they are transferred to hacker’s server.
As I had said earlier in the article, everything has 2 faces. So hacking is not only used for malicious purpose but somewhere it is used for good purposes also. The fact is it has been 5 years since Facebook pays Indian hackers for cracking bugs. Recently some Twitter accounts were hacked and abusive comments were passed. To remove such things security is provided in many ways. Say for making monetary transactions there are payment gateways. For entering pages and websites you have authentication and authorization techniques. Apart from these things, there are cyber security cells being setup for solving cases of digital problems. At last, whatever we provide for security, everyday new invention takes place and frankly speaking there is no lock that a human can’t break because the lock itself is created by the human only. So this proves that for unlike for every problem there is a solution there is break out for every lock. I want to conclude by saying that:
“Similarities b/w human and computer are more numerous than the differences.”
0 comments:
Post a Comment