blog




  • Essay / Ethical Hacking - 749

    Who is a hacker? Most people think of a hacker as someone who exploits vulnerabilities in electronic, network, and computer devices and systems to use them for malicious activities. About.com wrote: “Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is anyone engaged in hacking. The term "hacking" historically referred to constructive, intelligent technical work that was not necessarily related to hacking. Today, however, hacking and hackers are most often associated with malicious programming attacks on the Internet and other networks. It is true that hacking is mainly associated with unwanted activities and intrusions. However, not all hackers are bad. There are actually several types of hackers; white hat hackers, black hat hackers, gray hat, elite, neophyte, blue hat and hacktivist. Black hat hackers are called crackers and “they violate computer security for few reasons other than malice or personal gain” (Moore, 2005). Today, most people who are not IT professionals use the term "hacker" to define cracker. Black hackers carry out illegal activities via computer. On the other hand, white hat hackers are considered “good” because they do not hack to harm others. Their intention is to study networks and computers with the mind of hackers to find vulnerabilities and weaknesses and provide recommendations on how to improve protection against black hat hackers. White hat hackers are often called certified penetration testers. This article will discuss white hat hackers or penetration testers. How to become a white hat hacker? Hacking or penetration testing is a career in the IT field. Jobs are born from needs. "Business... middle of paper......ethical crime or ethical hacking. However, I believe ethical hacking should exist. "An ethical hacker is usually employed by an organization that trusts them to attempt to penetrate the networks and/or computer systems, using the same methods as a hacker, with the aim of finding and fixing computer security vulnerabilities. " (Wikipedia) In other words, hackers do not hack systems without authorization and permission. Moreover, the results they reveal through hacking are used to improve the system, thus creating a more secure system. Again once, businesses and governments hire penetration testers to identify security risks, threats and vulnerabilities in networks, systems and software and develop intrusion detection systems and antivirus programs, and. software deployment tools, so ethical hacking should be considered and respected as a professional career..