View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. What Is
May 18, 2016updated 22 Sep 2016 12:02pm

What is hacking?

News: CBR looks at the meanings of this broadly used term.

By Alexander Sword

The term ‘hacking’ is used very broadly, but in general is used to refer to seeking and exploiting weaknesses to networks and databases.

Hacking may target a network, which allows the hacker to gain access to a network and then intercept traffic on it.

It can also be aimed at gaining entry to a database of information.

This activity can be both legal and illegal and there are several possible objectives behind it.

There are many types of hacking, including cyber crime, ethical hacking, hacktivism, and state-sponsored hacking.

Cyber crime will usually be trying to gain entry to a network to gain access to data that they can use either for financial gain or feed back into more attacks.

This could include data such as intellectual property or more mundane personal information such as names or contact details. All of this data has a monetary value.

Content from our partners
How Midsona accelerated efficiency and reduced costs with a modern ERP system
Streamlining your business with hybrid cloud
A hybrid strategy will help distributors execute a successful customer experience

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.