Now that most people in countries that have a high GDP are able to access the Internet, we have come to think of it as becoming vital to the everyday normal way of life.
Most of use the Internet at work and we come home we spend an hour or so using it for entertainment.
As a society we have become pretty well connected with one another.
This is all due to our new-found reliance on the Internet as a social tool.
We tend to think of hackers as being the ones who would like to disrupt the online harmony that we have gathered together.
The problem is, hackers main fascination in life, is to deconstruct anything.
The fact that most hackers have dealt only in the digital realm is a side product.
There are hackers that love to take apart a system in the real world as well.
They are called social engineers.
Social engineering is not an art that was started by hackers but it has become essential in any elite hackers toolkit.
If you have a specific target that you want to take down, you have to be able to infiltrate it in a number of different ways.
Some of that will be through online means and some of that we be through through offline methods.
One of the most popular hackers is Kevin Mitnick.
He achieved most of his crimes not through his technical prowess, but his ability to get information out of people just by talking to them.
He would wear disguises and visit the companies that he was trying to infiltrate.
He would also disguise his voice on the phone and get information that way.
As an IT administrator you have to be aware of the potential offline attacks as well as online.
If you go online and read about groups known as Tiger teams then you will get a good understanding how professionals can work.
Tiger teams are a group of individual hackers that team up to infiltrate a system through both online and offline means.
Whatever it takes to get the job done.
These days so many people are worried about online security, that they are leaving their servers open to physical attacks.
Policies need to be created for both online and offline scenarios.
We have become to comfortable with the ideal of hackers being lonely individuals in their mothers basement.
We have to start realizing that the criminal hackers of today are highly organized and work in concert with other people to be able to penetrate a system.
If you take the proper precautions, you can help eliminate this fact.