Definition - What does Hacking mean?
Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate
any potential attacks.
any potential attacks.
What constitutes ethical hacking?
For hacking to be deemed ethical, the hacker must obey the following rules:
- Expressed (often written) permission to probe the network and attempt to identify potential security risks.
- You respect the individual's or company's privacy.
- You close out your work, not leaving anything open for you or someone else to exploit at a later time.
- You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.
The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals or cyber criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker, or CEH. This certification is provided by the International Council of E-Commerce Consultants (EC-Council). The exam itself costs about $500 to take and consists of 125 multiple-choice questions in version 8 of the test (version 7 consisted of 150 multiple-choice questions).
Hackers employ a variety of techniques for hacking, including:
- Vulnerability scanner: checks computers on networks for known weaknesses
- Password cracking: the process of recovering passwords from data stored or transmitted by computer systems
- Packet sniffer: applications that capture data packets in order to view data and passwords in transit over networks
- Spoofing attack: involves websites which falsify data by mimicing legitimate sites, and they are therefore treated as trusted sites by users or other programs
- Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators
- Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later
- Viruses: self-replicating programs that spread by inserting copies of the same program into other executable code files or documents
- Key loggers: tools designed to record every keystroke on the affected machine for later retrieval
Certain corporations employ hackers as part of their support staff. These legitimate hackers use their skills to find flaws in the company security system, thus preventing identity theft and other computer-related crimes
Thank you for this wonderful post.
ReplyDeleteEthical hacking course in Chennai | Ethical hacking certification in Chennai
It is very interesting to read.
ReplyDeleteEthical hacking Course in Chennai | Ethical hacking Training in Chennai
Great Post. Keep sharing such kind of worthy information
ReplyDeleteEthical Hacking Course in Chennai | Hacking Course in Chennai
Great Post. Keep sharing such kind of worthy information
ReplyDeleteEthical Hacking Course in Chennai | Hacking Course in Chennai
Best blog, Thanks for your information
ReplyDeleteEthical Hacking Course in Coimbatore
Hacking Course in Coimbatore
Ethical Hacking Training in Coimbatore
Ethical Hacking Training Institute in Coimbatore