Hacking for Everyone?: An Introduction to Cyber Security
()
About this ebook
The Internet and its associated technologies has steadily become a cornerstone of many peoples interaction with the world. It allows us to shop, bank, communicate, entertain ourselves and much more. It has provided a revolution in how we deal with everyday tasks and how we spend our free time.
Yet the Internet was designed in simpler times
Related to Hacking for Everyone?
Related ebooks
Digital Forensics Basics: A Practical Guide Using Windows OS Rating: 0 out of 5 stars0 ratingsDarknet: Into the Deepest Mysteries of the Internet Rating: 0 out of 5 stars0 ratingsOnline Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsStupid Ways People are Being Hacked! Rating: 0 out of 5 stars0 ratingsHacking: A Comprehensive Guide to Computer Hacking and Cybersecurity Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis Rating: 0 out of 5 stars0 ratingsTor and the Deep Web Rating: 0 out of 5 stars0 ratingsMobile Security: A Pocket Guide Rating: 0 out of 5 stars0 ratingsiBrain Hack Rating: 5 out of 5 stars5/5Kernel Based Virtual Machine A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsThe Cryptos Files: ICE Rating: 0 out of 5 stars0 ratingsThe Little Book of Artificial Intelligence Rating: 0 out of 5 stars0 ratingsTop Networking Terms You Should Know Rating: 0 out of 5 stars0 ratingsPC Safety 101 Rating: 0 out of 5 stars0 ratingsHow to Hack a Human: Cybersecurity for the Mind Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsTune into the Cloud: The story so far Rating: 0 out of 5 stars0 ratingsAdvances in Cyber Security: Technology, Operations, and Experiences Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsHidden Realms - A Pathway To Hacking Rating: 5 out of 5 stars5/5Detained Rating: 0 out of 5 stars0 ratingsDigital Forensics A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsLossless Information Hiding in Images Rating: 0 out of 5 stars0 ratingsOWNED: Why hacking continues to be a problem Rating: 0 out of 5 stars0 ratingsMaster Hacking Plan Rating: 0 out of 5 stars0 ratingsGame and Graphics Programming for iOS and Android with OpenGL ES 2.0 Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsDark Web Rating: 5 out of 5 stars5/5
Internet & Web For You
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsGet Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsPodcasting For Dummies Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5How to Destroy Surveillance Capitalism Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Wordpress for Beginners: The Easy Step-by-Step Guide to Creating a Website with WordPress Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsHow To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Six Figure Blogging In 3 Months Rating: 4 out of 5 stars4/5Social Media Marketing For Dummies Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5
Reviews for Hacking for Everyone?
0 ratings0 reviews
Book preview
Hacking for Everyone? - Keith Sutherland
Introduction
About the Author
I have been working in computer security or ‘Cyber Security’ for over thirty years. Working for large businesses, government agencies and military establishments has given me a wide experience of many of the problems and issues ordinary computer users have with security associated with their use of computers. So, I decided to write this book to explain many of the features of modern computer use that have been with us for over thirty years and that give rise to many of the problems we have today.
I found writing this book very challenging. I wanted to write a book that explained to the general reader how a now all-pervasive technology came to be and how all the inherent weaknesses of this technology can be exploited by resourceful hackers intent on causing a variety of outcomes. Unfortunately, the computer industry is not consistent in its use of terms, so often hackers are referred to as ‘bad actors’. The terms are interchangeable.
I did not want to use heavy technical descriptions that would explain to the technical specialist just how certain techniques work. As I stated earlier, this is intended to be a book for the ordinary computer user, not the technical specialist. As such, I have had to re-think information, skills and technologies that I have used and been familiar with for over thirty years. That process has not been an easy one. This book will not teach you how to become a hacker; that is not its aim. Rather, it teaches you about the common techniques hackers use and how they work so you can start to protect yourself. Protection from hacking or being hacked is not something that can be completely automated; it is something each and every one of us has to get involved in if we are to protect ourselves. In any hacking situation there is usually a chain of events; this chain involves people, processes and technology. If there is a failure in any one of these components, this increases the vulnerability of the system or person.
To begin with, there is no simple definition of a hacker. In the 1960s and 1970s such a person would have been seen as an engineer trying to work out how some system worked. This role then evolved into people hacking for money, for extortion, for political purposes and many other reasons. This now includes organised crime and state-sponsored activities. Hackers use a variety of techniques that will be explained in this book. Clearly, in a small volume like this, I cannot go into detail about every single hack and exploit. I cover a selection of the most common with example screenshots and suitable explanations. But, before we begin, some essential concepts need to be understood from the outset.
Some Definitions
Firstly; the Internet is NOT the same as the World Wide Web (WWW). In modern talk and journalism the two are seen as the same thing. They are fundamentally different. If I were to use human language as an example, the Internet is comparable to all human languages. This means there are many of them. The World Wide Web is just one of these languages, albeit a very popular and pervasive one. The reader can think here that the World Wide Web is the English language while the Internet is every language in the world, including English. In Internet terms, these languages are called protocols, a system of communication and control. The World Wide Web uses a protocol called Hypertext Transfer Protocol or HTTP. This is only one of the over two hundred protocols available on the Internet. Each of these has its own strengths and weaknesses that a knowledgeable hacker can utilise. If one secures one’s web interface, there remain many hundred other protocols that a competent hacker may exploit.
Secondly; the Internet was never intended to be secure in the sense we mean today. In the late 1960s and early 1970s, when many of the core principles were being laid down, it was seen as being a trusted network (largely for military purposes) for communication amongst a trusted community with very limited access to the network itself. No-one then foresaw how it would develop. In the early 1980s, one report speculated that if the Internet carried on growing there may well be as many as 3,000 computers or devices on it. Clearly, given the over four billion computers, tablets, phones, printers and other devices on it today, and its use in controlling many industrial systems, things have come a long way, but all these systems still use those open, trusting protocols that can be exploited by the unscrupulous.
Thirdly; there is, once again, in common and journalistic parlance, a tendency to use the words ‘coding’ or ‘programming’ to mean creating web pages. When these words are used in this book, they mean computer programming or computer coding. This means we use computer languages such as Java, C, C++, BASIC, FORTRAN and Assembly language. These are specific technical languages that allow the programmer to control the underlying hardware that comprises the computer system the programmer wishes to control. This approach and technique is called ‘software engineering’. Web page design uses a language called HTML (Hypertext Markup Language). These last two words give the game away. They do not say Programming Language! In a markup language, commands say things like position this box here
, colour this box blue
display this text in bold
. This is not the same as the very detailed instruction in a programming language. There are some similarities between the two approaches but only similarities. Throughout the book, I use the