Informative Essay On Ethical Hacking

Improved Essays
“As a young boy, I was taught in high school, hacking was cool.”

- Kevin Mitnick

Tell me what is the first thing that comes to your mind when you hear the term ‘hacking’? Brighten up your imagination a bit more and tell me how do you portray a ‘hacker’? Well, I am sure most of the will imagine a hacker as a geek, who is mysteriously attractive and is surrounded by many computers with codes running in them. One term that is used by the majority of the population to describe a hacker is ‘cool’. Today, we will try to know a bit more about this cool topic of hacking and to be precise, we will discuss ethical hacking.

What Is Ethical Hacking?

Before understanding the term ‘ethical hacking’, you should have a brief idea about the word ‘hacking’.
…show more content…
So, what can make you an ethical hacker? The answer is you should have the spirit of a hacker. It means you should have the passion for learning about your field of interest. You should have the desire to excel in it. You can’t look up to fixed guides for showing you the road, you need to be creative and experimental to be a hacker. You should be a risk taker who can take the risk of learning new stuff without any guidance. Obviously, you will need the basic knowledge for hacking but then you can use that piece of information to be an ordinary penetration tester. Hacking demands something more than that.

“My primary goal of hacking was the intellectual curiosity, the seduction of adventure.”

- Kevin Mitnick

Would you like to know the names of few famous ethical hackers? Here are the top five ethical hackers of the world:-

Kevin Mitnick (a.k.a. The Condor)
Kevin Poulsen (a.k.a Dark Dante)
Adrian Lamo (a.k.a The Homeless Hacker)
Stephen Wozniak (a.k.a Berkeley Blue)
Loyd Blankenship (a.k.a The Mentor)
I would like to end the post with a statement made by Adrian Lamo.

“There’s no such thing as 100% safety, security, or privacy. All you can do is mitigate

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Hacking computers and defending against hacks is like something out of a movie, to me it's something that people would be like "wow, that's really cool." The skills I possess for this job aren't many. I know a little about computers and some commands to navigate the system and fix some things. I also know some simple commands and how some functions on Kali Linux work also. To be…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Like I said, It's never fun when someone is hacking, because it is never fair when they are in PvP, etc. If someone reported a hacker in game, I would go and check it out to see for myself. And if they were definitely hacking, I would record them for proof, then instantly Ban them, and then I would go to another staff member, or someone higher ranked then me, and show…

    • 278 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Lessons in a Season Throughout the American Crime series, many issues were brought up throughout the season regarding ethical issues. These issues, are most that society does not bring up in open conversation as they are difficult to discuss. These issues include racism, sexism, stereotypes, bigotry, discrimination and many more. The series brought light and attention to these things with an amazing story about a boy in high school who was allegedly rapped by another teen. Many of the scenes were made to make the audience feel uncomfortable and difficult to watch as they have never openly observed the situations which occurred in the show.…

    • 1997 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    “At 10:30 P.M. on a Wednesday, three of the four seniors, armed with Walgreens-issue water pistols, staked out Cohen’s house in a blue Toyota minivan.” Both of these actions in the real world would be considered suspicious and disrespectful of one’s privacy, and you could possibly need to pay fines for this, so schools should not allow a game be an exception, as players may be led to think that stalking someone is acceptable. Even though some might argue that learning how to hack can be useful and is a smart move, if you did so in real life, the police would not care that the hacker was smart, they would see it as suspicious activity anyways and you could be…

    • 785 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    The question is, “How we control to how far the next hacker goes and for what reason. This is why to media will be an eternal source for this subculture. The federal government has done a good job with catching there ethical hacker and turning them into White Hats for the great good of the country, but there still a lot of them out…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Anonymous: The Generation of Hacktivists “We are not hackers. We are not terrorists. We are not violent. We are citizens of the world who bear witness to tyranny, oppression and censorship.” “We resist those who seek to violate our rights as human beings.”…

    • 1851 Words
    • 8 Pages
    Great Essays
  • Great Essays

    What is right or wrong is whether or not they get punished and their needs were satisfied (Taylor, Fritsch, & Liederbach, 2015). Ex: Hacking is a digital crime, whether it be for status quo, pleasure or criminal intent, all aspects of hacking is considered a digital crime. Most hackers, hack for status quo or pleasure, and feel as if they are not committing a crime as no harm is done. While some computer and of digital communication intrusion is caught, there are much that goes un-noticed, and unpunished. Leaving Hackers in the mindset that their criminal acts are acceptable and correct, as their needs are satisfied, and their criminal acts go unpunished.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Hacker can get in a lot of trouble for hacking but, if they hack a car, that is a different story because they can go to jail and will definitely get in a ton of trouble There is a really high chance that that will not happen because of the blocks and new technology coming…

    • 851 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction “The concepts of ethics, character, right and wrong, and good and evil have captivated humankind ever since we began to live in groups, communicate, and pass judgment on each others ' actions based on motivation, group rules and norms, and intermediate and end results.” After reading that in the syllabus, I became incredibly intrigued as to what was to come in this class. Ethics not only effects information technology but the whole world and throughout the course we have been able to link ethical considerations to all aspects, with focus on information technology. Takeaways…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As claimed by Andrew Beattie “There are hackers who do good work, by hacking into sites in order to inform and help improve that person's security.” His statement shows a more positive side on the topic in this argument. Although a consensus shows that a large amount of people think of hacking as obtaining personal information illegally, not all hackers are as bad because they use their skills for testing company security and to help spread awareness of certain issues. The argument of this topic definitely has both good reasonings for each one which would make it difficult to choose a side, despite the long amount of research put into this looking for reasons to support the argument there has been a great amount of positive outcomes from this.…

    • 1245 Words
    • 5 Pages
    Great Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays