Who is Hacker ?

Today, individuals and companies use computers to run their business. Now this has become almost mandatory. It is no longer unthinkable for these computers to be isolated from other computers and not be able to communicate with them. Computers that are not connected to both the internet and an internal network are considered nonfunctional.

As computers evolved, so did the need to connect them to other external systems. With this situation, the term hacker (computer hacker) began to be born. In the early days, hackers did not have malicious intent. Hacker actions were only made to study and know how other networks were working. With the widespread use of computers, the fact that more people have knowledge of code and networks, and the exchange of information has become more widespread, some hackers have paved the way for malicious use of these skills.

Definition of Hacker

Although hacker was a term used for programmer or people who use computer codes when it was first used in the 1960s, today it is the name given to people who have an advanced knowledge of computer, network, programming or hardware and use these skills in various jobs.

Today, thanks to the media, the word hacker has a bad or negative connotation. The act of hacking is perceived as malicious people stealing other people's or companies' information, defrauding them or even harming government organizations. Although there are people who do this, they make up a small part of what we call hackers. In reality, many of these so-called hackers are people who are curious about how computers, networks or programs work, but also develop new technologies and innovate. They use this information to help companies and governments create better security measures.

Hackers are classified according to the purpose of their actions.

Ethical Hacker - They usually work within an institution or in collaboration with them. It is the name given to those who take action to find and correct a weakness or vulnerability.

Black Hat Hacker (Cracker) - Persons who access systems without authorization, steal data, violate privacy rights or take actions to cause harm in a similar way for personal or contracted persons.

Grey Hat Hacker - It is the name given to those among the Ethical or Black Hat hacker group. These people usually detect vulnerabilities in the system illegally and often show or repair them for money.

Script Kiddies - People who access computer systems using applications made by others are called. (Most hackers do not qualify this group as hackers)



You May Interest

History of Silicon Valley

Memory Units of Measure

Where to Start the Software

What is Cloud Technology?

What is ERP?