A person who bypasses legitimate controls on an information system to gain access illegally

Suggest a new Definition

Proposed definitions will be considered for inclusion in the Economictimes.com


Definition: Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

Description: To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

  • PREV DEFINITION

  • NEXT DEFINITION

Related News

  • A person who bypasses legitimate controls on an information system to gain access illegally
    TikTok hacked, over 2 bn user database records stolen: Security researchersCyber-security researchers on Monday discovered a potential data breach in Chinese short-form video app TikTok, allegedly involving up to 2 billion user database records.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Zoom rolls out key security update on Mac to prevent hackers from gaining device controlThe researcher found that hackers could trick Zoom into installing malware.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Travel booking website Cleartrip announces data breach in internal systemsCleartrip clarified that while some personal details of customers were a part of the leak, no sensitive information was compromised.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Flipkart-owned Cleartrip reports user data breachCleartrip clarified that while some personal details of customers were a part of the leak, no sensitive information was compromised.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Flipkart-owned Cleartrip reports user data breachCleartrip clarified that while some personal details of customers were a part of the leak, no sensitive information was compromised.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Email scams are getting more personal: Here is how to protect yourselfBut the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they can find about us. The infamous “prince of Nigeria” emails are falling out of fashion. Instead, scammers are scouring social media, especially business-related ones like LinkedIn, to target people with tailored messages.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Apple and Android phones hacked by Italian spyware, Google saysMilan-based RCS Lab, whose website claims European law enforcement agencies as clients, developed tools to spy on private messages and contacts of the targeted devices, the report said.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Russian ministry website appears hacked; RIA reports users data protectedRussia's state news agency RIA late on Sunday quoted a ministry representative as saying that the site was down but users' personal data were protected. RIA said that other media had reported that hackers were demanding a ransom to prevent the public disclosure of users' data.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Hackers steal $180 million in crypto from Beanstalk FarmsThe hackers exploited Beanstalk's majority vote governance system, a core feature of many DeFi protocols.
  • A person who bypasses legitimate controls on an information system to gain access illegally
    Russian pullout meets NATO scepticism, Ukraine defence website still hackedThe Russian defence ministry published video that it said showed tanks, infantry fighting vehicles and self-propelled artillery units leaving the Crimean peninsula, which Moscow seized from Ukraine in 2014. NATO Secretary-General Jens Stoltenberg said a pullout would be welcome but that moving troops about did not confirm it.