Hacking involves different types of threats to computer systems, including attacks on availability, confidentiality, integrity, and authentication. The document outlines the history of hacking from the 1970s telephone hacking to modern viruses and worms. It defines ethical hackers as those who test security systems with authorization to find vulnerabilities, unlike black hat hackers who break into systems illegally and for malicious purposes such as cybercrime.