Hacking for Everyone?: An Introduction to Cyber Security
()
About this ebook
The Internet and its associated technologies has steadily become a cornerstone of many peoples interaction with the world. It allows us to shop, bank, communicate, entertain ourselves and much more. It has provided a revolution in how we deal with everyday tasks and how we spend our free time.
Yet the Internet was designed in simpler times
Related to Hacking for Everyone?
Related ebooks
Darknet: Into the Deepest Mysteries of the Internet Rating: 5 out of 5 stars5/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Online Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5The Effects of Cybercrime in the U.S. and Abroad Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsCybersecurity Experts Rating: 0 out of 5 stars0 ratingsA First Course In Ethical Hacking Rating: 0 out of 5 stars0 ratingsCyber Curiosity: A Beginner's Guide to Cybersecurity Rating: 0 out of 5 stars0 ratingsBecoming an Ethical Hacker Rating: 4 out of 5 stars4/5My Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsOWNED: Why hacking continues to be a problem Rating: 0 out of 5 stars0 ratingsConquer the Web: The Ultimate Cybersecurity Guide Rating: 0 out of 5 stars0 ratingsThe Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime Rating: 0 out of 5 stars0 ratingsAnatomy of a cyberattack Rating: 0 out of 5 stars0 ratingsDeep Web for Journalists: Comms, Counter-Surveillance, Search Rating: 5 out of 5 stars5/5Ultimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Learn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsEthical Hacking and Computer Securities for Beginners Rating: 0 out of 5 stars0 ratingsMobile Computing: Securing your workforce Rating: 0 out of 5 stars0 ratingsConfiguration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools Rating: 0 out of 5 stars0 ratingsRead People Like a Pro Rating: 0 out of 5 stars0 ratingsThe Little Black Book For Men Rating: 0 out of 5 stars0 ratingsCybersecurity Implications of Election 2016 Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5UX/UI Design Playbook Rating: 4 out of 5 stars4/5Principles of Web Design Rating: 0 out of 5 stars0 ratingsWeb Design For Dummies Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5HTML in 30 Pages Rating: 5 out of 5 stars5/5Learn NodeJS in 1 Day: Complete Node JS Guide with Examples Rating: 3 out of 5 stars3/52022 Adobe® Premiere Pro Guide For Filmmakers and YouTubers Rating: 5 out of 5 stars5/5Publishing E-Books For Dummies Rating: 4 out of 5 stars4/5Kill All Normies: Online Culture Wars From 4Chan And Tumblr To Trump And The Alt-Right Rating: 3 out of 5 stars3/5Notion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5SEO For Dummies Rating: 4 out of 5 stars4/548 Really Useful Web Sites Rating: 5 out of 5 stars5/5Build a WordPress Website From Scratch 2024: WordPress 2024 Rating: 0 out of 5 stars0 ratingsMaking TikTok Videos Rating: 5 out of 5 stars5/5Get Into UX: A foolproof guide to getting your first user experience job Rating: 4 out of 5 stars4/5Advanced Web Development with React: SSR and PWA with Next.js using React with advanced concepts Rating: 0 out of 5 stars0 ratingsCOMPUTER SCIENCE FOR ROOKIES Rating: 0 out of 5 stars0 ratingsWordPress For Dummies Rating: 0 out of 5 stars0 ratings
Reviews for Hacking for Everyone?
0 ratings0 reviews
Book preview
Hacking for Everyone? - Keith Sutherland
Introduction
About the Author
I have been working in computer security or ‘Cyber Security’ for over thirty years. Working for large businesses, government agencies and military establishments has given me a wide experience of many of the problems and issues ordinary computer users have with security associated with their use of computers. So, I decided to write this book to explain many of the features of modern computer use that have been with us for over thirty years and that give rise to many of the problems we have today.
I found writing this book very challenging. I wanted to write a book that explained to the general reader how a now all-pervasive technology came to be and how all the inherent weaknesses of this technology can be exploited by resourceful hackers intent on causing a variety of outcomes. Unfortunately, the computer industry is not consistent in its use of terms, so often hackers are referred to as ‘bad actors’. The terms are interchangeable.
I did not want to use heavy technical descriptions that would explain to the technical specialist just how certain techniques work. As I stated earlier, this is intended to be a book for the ordinary computer user, not the technical specialist. As such, I have had to re-think information, skills and technologies that I have used and been familiar with for over thirty years. That process has not been an easy one. This book will not teach you how to become a hacker; that is not its aim. Rather, it teaches you about the common techniques hackers use and how they work so you can start to protect yourself. Protection from hacking or being hacked is not something that can be completely automated; it is something each and every one of us has to get involved in if we are to protect ourselves. In any hacking situation there is usually a chain of events; this chain involves people, processes and technology. If there is a failure in any one of these components, this increases the vulnerability of the system or person.
To begin with, there is no simple definition of a hacker. In the 1960s and 1970s such a person would have been seen as an engineer trying to work out how some system worked. This role then evolved into people hacking for money, for extortion, for political purposes and many other reasons. This now includes organised crime and state-sponsored activities. Hackers use a variety of techniques that will be explained in this book. Clearly, in a small volume like this, I cannot go into detail about every single hack and exploit. I cover a selection of the most common with example screenshots and suitable explanations. But, before we begin, some essential concepts need to be understood from the outset.
Some Definitions
Firstly; the Internet is NOT the same as the World Wide Web (WWW). In modern talk and journalism the two are seen as the same thing. They are fundamentally different. If I were to use human language as an example, the Internet is comparable to all human languages. This means there are many of them. The World Wide Web is just one of these languages, albeit a very popular and pervasive one. The reader can think here that the World Wide Web is the English language while the Internet is every language in the world, including English. In Internet terms, these languages are called protocols, a system of communication and control. The World Wide Web uses a protocol called Hypertext Transfer Protocol or HTTP. This is only one of the over two hundred protocols available on the Internet. Each of these has its own strengths and weaknesses that a knowledgeable hacker can utilise. If one secures one’s web interface, there remain many hundred other protocols that a competent hacker may exploit.
Secondly; the Internet was never intended to be secure in the sense we mean today. In the late 1960s and early 1970s, when many of the core principles were being laid down, it was seen as being a trusted network (largely for military purposes) for communication amongst a trusted community with very limited access to the network itself. No-one then foresaw how it would develop. In the early 1980s, one report speculated that if the Internet carried on growing there may well be as many as 3,000 computers or devices on it. Clearly, given the over four billion computers, tablets, phones, printers and other devices on it today, and its use in controlling many industrial systems, things have come a long way, but all these systems still use those open, trusting protocols that can be exploited by the unscrupulous.
Thirdly; there is, once again, in common and journalistic parlance, a tendency to use the words ‘coding’ or ‘programming’ to mean creating web pages. When these words are used in this book, they mean computer programming or computer coding. This means we use computer languages such as Java, C, C++, BASIC, FORTRAN and Assembly language. These are specific technical languages that allow the programmer to control the underlying hardware that comprises the computer system the programmer wishes to control. This approach and technique is called ‘software engineering’. Web page design uses a language called HTML (Hypertext Markup Language). These last two words give the game away. They do not say Programming Language! In a markup language, commands say things like position this box here
, colour this box blue
display this text in bold
. This is not the same as the very detailed instruction in a programming language. There are some similarities between the two approaches but only similarities. Throughout the book, I use the