Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,162,771 members, 7,851,635 topics. Date: Thursday, 06 June 2024 at 02:09 AM

What Is Ethical Hacking? - Science/Technology - Nairaland

Nairaland Forum / Science/Technology / What Is Ethical Hacking? (221 Views)

Which Certification Is The Best For Ethical Hacking? / Cyber Security And Ethical Hacking / Want To Learn Ethical Hacking? Here's The Thread For You! (2) (3) (4)

(1) (Reply)

What Is Ethical Hacking? by softedu: 1:06pm On Feb 03, 2022
The term ‘Hacker’ was coined to describe experts who used their skills to re-develop mainframe systems, increasing their efficiency and allowing them to multi-task. Nowadays, the term routinely describes skilled programmers who gain unauthorized access into computer systems by exploiting weaknesses or using bugs, motivated either by malice or mischief. For example, a hacker can create algorithms to crack passwords, penetrate networks, or even disrupt network services.

The primary motive of malicious/unethical hacking involves stealing valuable information or financial gain. However, not all hacking is bad. This brings us to the second type of hacking: Ethical hacking. So what is ethical hacking, and why do we need it? And in this article, you will learn all about what is ethical hacking and more.

Ethical Hacking?
Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. The company that owns the system or network allows Cyber Security engineers to perform such activities in order to test the system’s defenses. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal.

Ethical hackers aim to investigate the system or network for weak points that malicious hackers can exploit or destroy. They collect and analyze the information to figure out ways to strengthen the security of the system/network/applications. By doing so, they can improve the security footprint so that it can better withstand attacks or divert them.

Ethical hackers are hired by organizations to look into the vulnerabilities of their systems and networks and develop solutions to prevent data breaches. Consider it a high-tech permutation of the old saying “It takes a thief to catch a thief.”

What are the key concepts of ethical hacking?

Hacking experts follow four key protocol concepts:

Stay legal. Obtain proper approval before accessing and performing a security assessment.
Define the scope. Determine the scope of the assessment so that the ethical hacker’s work remains legal and within the organization’s approved boundaries.
Report vulnerabilities. Notify the organization of all vulnerabilities discovered during the assessment. Provide remediation advice for resolving these vulnerabilities.
Respect data sensitivity. Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement, in addition to other terms and conditions required by the assessed organization.
How are ethical hackers different than malicious hackers?

Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach.

An ethical hacker reports the identified vulnerabilities to the organization. Additionally, they provide remediation advice. In many cases, with the organization’s consent, the ethical hacker performs a re-test to ensure the vulnerabilities are fully resolved.

Malicious hackers intend to gain unauthorized access to a resource (the more sensitive the better) for financial gain or personal recognition. Some malicious hackers deface websites or crash backed servers for fun, reputation damage, or to cause financial loss. The methods used and vulnerabilities found remain unreported. They aren’t concerned with improving the organizations security posture.

visit: https://edukero.com

(1) (Reply)

Sophia The Robot / Meet Itel P38 Series, The Big Battery Smartphones You Deserve / Lean Six Sigma And The Service Industry

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 11
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.