How hacking activities evolved into cyberwarfares

In the previous blog, we have covered on the topic of White hat hackers, that they are the good hackers although they may also cause some negative impacts. Today, I would like to discuss the another type of hackers, the Blackhat hackers. I will cover the origin of hacking activities and how it goes to cyberwarfare.

ob_73e260_cibercriminal.jpg

Blackhat hackers are cybercriminals whose intentions are completely malicious. (Hargrave, 2012) They deliver viruses to damage the cyberspace, plunder computer systems just for their own benefits. Black hacker has been a bad symbol known to everyone.

“In fact, computer hackers were originally viewed by society as technology enthusiasts who wanted nothing more than to optimize, customize and tinker. It wasn’t until decades later – with the birth of viruses and cybercrime – that traditional hackers got lumped together with those of malicious intent and the public vilification of hacking began.” (Tripwire Guest Authors, 2016)

In the 1980s, computers were starting to be available for everyone to use for not just businesses or universities but own purposes. (Tripwire Guest Authors, 2016) This creates a group of other hackers who are more concerned with their personal gains. They use their technology for criminal activities, including pirating software, making viruses and stealing sensitive information into the system. (Tripwire Guest Authors, 2016) The advent of cybercriminals saw the first hacking-related legislation in 1986. At the same time, the public started to panic about the terrible things hackers can do as digital experts. (Tripwire Guest Authors, 2016)

The activities of these other categories of hackers have evolved into all kinds of misconduct that can now be described as cyber-attacks today. Examples of such cyberwars include the Stuxnet worm, a purpose-built digital virus. (Zetter, 2011) All happened because of the conflict between the United States and Israel, that the US designed to weaken Isil’s online communications network and destroy the centrifuge used by Iran’s nuclear program. (Zetter, 2011)

Network weapons will not disappear, its spread is uncontrollable. The world needs to establish a set of principles to keep the government in a correct behavior in cyber conflicts. The leaders of all countries in the world should establish a framework of encouragement and sanctions to encourage the government to stop the devastating cyber attacks first and foremost. (Cohen, 2017)

stophack.gif

 

  1. Tripwire Guest Authors (2016, August 17). The Evolution of Hacking. Retrieved November 18, 2017, from https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-evolution-of-hacking/
  2. Hargrave, V. (2012, June 17). Hacker, Hacktivist, or Cybercriminal? -. Retrieved November 18, 2017, from http://blog.trendmicro.com/whats-the-difference-between-a-hacker-and-a-cybercriminal/
  3. Zetter, K. (2011, July 11). How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History. Retrieved November 18, 2017, from https://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/
  4. Cohen, J. (2017, August 11). How to Prevent a Cyberwar. Retrieved November 18, 2017, from https://www.nytimes.com/2017/08/11/opinion/cyberwar-cybersecurity-russia-us.html
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s