An Introduction


               Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and cybercrime. Cybercrime is using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data etc. Cybercrimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
What does Hacking mean?
  • Hacking is defined  as identifying weakness in computer systems and/or  networks and exploiting the weaknesses to gain access.

 An example  : using by passing the login algorithm to gain access to a system. 
  • hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security

Types of Computer Hackers

White Hats: IT Security Specialists (Ethical hackers)

  • Despite being hackers, white hats are the good guys. McAfee describes white hats as trained IT specialists who are hired by organizations to test their cyber defenses against attack and inform them of any weaknesses. White hats work to improve overall computer and Internet security and prevent intrusions into protected or privileged networks. As experts in the only form of hacking considered a legitimate form of business, white hats are employed by governments, private companies and nonprofit organizations to safeguard their information.

Black Hats: Malicious Cyber Criminals

  • The polar opposite of white hats, black-hat hackers are motivated by the potential for self-gain or amusement. According to SecPoint security experts, black hats -- also called crackers -- exploit weaknesses to steal information for fraud or resale. Black hats are also responsible for the creation of viruses, usually to accomplish the same goals of information theft or to create mayhem for their own amusement. Black hats generally operate independently, almost always outside the law.

Grey Hats: Somewhere in Between

  • SecPoint also describes grey-hat hackers, who are neither entirely positive like white hats nor entirely negative like black hats. Grey hats are mostly motivated by the desire to test their own skills, cracking security systems and leaving a handle as a calling card without taking any information or leaving a virus. Many times they may even inform the owner of the system after the fact and help them build a stronger defense for a fee, like a white hat hacker. However, grey hats are not invited and act of their own volition, much like black hats.
Why ethical hacking?
·         Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
·         Cybercrime is committing crime with the aid of computers and information technology infrastructure.
·         Ethical hacking is about improving the security of computer systems and/or computer networks.
·         Ethical hacking is legal.
·         Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
·         Hacking can lead to loss of business for organizations that deal with money such as paytm. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
Legality of ethical hacking
Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.




Comments

Post a Comment

Popular posts from this blog

Activate Office 365 pro plus

Activate Office 2019 using KMS license key

Microsoft Office Pro Plus 2019