Sunteți pe pagina 1din 3

ROBISO, CHRISTINE M.

WHY DO HACKERS HACK?

 Steal/Leak Information

These data and information could be about your customers, your internal employees or even private
data specific to your business. There are cases where hackers typically go after big targets in order to
get the most attention.

A lot of times, hackers also steal information in order to assume your personal identity and then use it
for something else like transferring money, taking a loan, etc.

 Disrupt Services

Hackers love to take something down. And then also leave a statement on the website - more on that
later. But hackers have successfully taken down many services by creating bots that overwhelm a
server with traffic, thus, leading to a crash known as a DoS (Denial of Service) attack that can put a
company’s website out of service for a while.

There are other ways also, like infecting a large network with malicious software inserted onto one
computer either through email or otherwise which leads to a chain reaction affecting the whole
network. Server disruption attacks usually have their own personal motive. Mainly, it is to render a
service or website useless. Sometimes it can also be to make a point.

 Make a Point

The hackers who fall into this category are very interesting. They don't care about money or data. They
seem to feel that they have a higher purpose in life. They just want to steal information or disrupt your
network in order to make a point.

 Money

Hackers not only hack businesses and ask for ransom but they also try hacking into regular user
accounts and try to take advantage of things like online banking, online retail, etc. where financial
transactions are involved.

 Driven by Purpose - Hacktivism, Idealism, Political Motives

Many hackers are also drive by a specific purpose. Sometimes, this comes out only when they get
caught. Some of them aim to be idealists and take it upon themselves to expose injustice, some have
political motives, some simple target the government, and so on.

IP ADDRESS

An IP address, or simply an "IP," is a unique address that identifies a device on the Internet or a local
network. It allows a system to be recognized by other systems connected via the Internet protocol.
There are two primary types of IP address formats used today — IPv4 and IPv6.

 It's a network address for your computer so the Internet knows where to send you emails, data
and picture
 The IP address is a fascinating product of modern computer technology designed to allow one
connected computer (or "smart" device) to communicate with another device over the
Internet.
 IP addresses allow the location of literally billions of digital devices that are connected to the
Internet to be pinpointed and differentiated from other devices.

VPN

A VPN, or Virtual Private Network, allows you to create a secure connection to another network over
the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from
prying eyes on public Wi-Fi, and more.

They originally were just a way to connect business networks together securely over the internet or
allow you to access a business network from home.

In very simple terms, a VPN connects your PC, smartphone, or tablet to another computer (called a
server) somewhere on the internet, and allows you to browse the internet using that computer’s internet
connection. So, if that server is in a different country, it will appear as if you are coming from that
country, and you can potentially access things that you couldn’t normally.

You can use a VPN to:

 Bypass geographic restrictions on websites or streaming audio and video.


 Watch streaming media like Netflix and Hulu.
 Protect yourself from snooping on untrustworthy Wi-Fi hotspots.
 Gain at least some anonymity online by hiding your true location.
 Protect yourself from being logged while torrenting.

SUBNET MASK

A subnet mask is a number that defines a range of IP addresses that can be used in a network. (It is
not something you wear on your head to keep subnets out.) Subnet masks are used to designate
subnetworks, or subnets, which are typically local networks LANs that are connected to the Internet.
Systems within the same subnet can communicate directly with each other, while systems on different
subnets must communicate through a router. Therefore, subnetworks can be used to partition multiple
networks and limit the traffic between them.

NETWORK ID

 Network identity (network ID) is a portion of the TCP/IP address that is used to identify individuals
or devices on a network such as a local area network or the Internet. Network ID is designed to
ensure the security of a network and related resources.
 Network IDs are critical to the management and tracking of user resources, including data,
applications, devices and equipment.
 A network ID is also known as network identification or NetID.
 A network ID authenticates access to IT network equipment, devices, servers, portals, content,
applications and/or products, as well as user credentials, preferences and contact information.
HOST IP ADDRESS

 In network addressing, the host address, or the host ID portion of an IP address, is the portion of
the address used to identify hosts (any device requiring a Network Interface Card, such as a PC
or networked printer) on the network.
 A host (also known as "network host") is a computer or other device that communicates with
other hosts on a network. Hosts on a network include clients and servers -- that send or receive
data, services or applications. On a TCP/IP network, each host has a host number that, together
with a network identity, forms its own unique IP address. In the Open Systems Interconnection
(OSI) model, protocols in the transport layer, also known as Layer 4, are responsible for
communication between hosts. Hosts use various protocols to communicate, including
transmission control protocol (TCP) and User Datagram Protocol (UDP).

References:

https://www.appknox.com/blog/why-do-hackers-hack

https://whatismyipaddress.com/ip-address

https://techterms.com/definition/ip_address

https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/

https://pc.net/glossary/definition/subnet_mask

https://www.quora.com/In-IP-addresses-what-is-meant-by-network-ID-and-host-ID

https://searchnetworking.techtarget.com/definition/host

https://www.techopedia.com/definition/4029/network-identity-network-id

S-ar putea să vă placă și