The Reality of Hacking

January 5, 2017 | Views: 6396

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

When we hear the word hacking, we see it as gaining an unauthorized access to the system and having a control over it. Normally, we think that the “system” I mentioned was just all about computers.  But it is wrong, hacking is not limited just to computer stuff.  Many beginners who wanted to learn how to hack (like me) think that hacking is just using the computer; however, understanding how it works and how to properly use tools to perform the hack involve a deeper understanding of not just computers (and similar devices), but also the reasoning behind it, and who “hackers” really are. An oversimplified definition of hacking is the way of making something do what you want it to do as opposed to what should it really do. That “something” I mentioned is not just a computer in general. A good analogy would be the use of a paper clip. This paper clip is simply designed to clip papers. But you see we can use the paper clip to make the wires of our laptop charger to stay in place when we curl it or we use the paper clip to clip it to the side of a thin table then we use the metal holder to hang our wires of our laptop charger. This is already called a hack because we just use the paper clip for any purpose we think we can use it for, as opposed to what it was originally intended to do. You may have heard the term/phrase “life hacks” or “life hacking.” This refers to ways of accomplishing a task by using a thing or object (originally designed for a specific purpose) for something else.

So what is the relation of that in the world of IT? I just want to emphasize that hacking is not just limited to computer stuff. But why, when we hear the word “hacking,” do we often think that it is about computers? That is because we are in the age where technology has risen to the top and forefront of people’s lives and minds, and almost every form of information we can think of is stored on computers or uses computers as a medium to transfer information, which can easily be done by the use of IoT devices. That is why computers became the target of “hacking” because the information across them is quite sensitive and can affect the living of the person in reality so many other people attempted to gain access to it. That sensitive information includes things such as bank accounts, credit card numbers etc., which can bring danger in a person’s life in the real world. That is why in order to become a real hacker, we should not limit ourselves just to computers but apply it in whatever things we could think of in our life. Remember that in order to become a hacker, you must think like one. Learning to apply that thinking to computers will expand your area of hacking which is similar to how computers expand our lives.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
16 Comments
  1. well thought

  2. Good article, good read!

  3. This is a good article for beginners learning to expand their definition of hacking. Specifically, social engineering, policy enforcement and physical security need a hands on mostly non-technical approach.

  4. Well thought and written. KUTGW

Page 1 of 3123»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel