Ethical Hacking Essay

8354 Words Sep 9th, 2014 34 Pages

1.0 Introduction

With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the
…show more content…
It is both productive for both company and the hacker.

1. What is Ethical Hacking

Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view [1]. As the name ethical hacking already tells, the idea has something to do with hacking.

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them [2].
The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as crackers), the second definition is much more commonly used. [3]
In the context of ethical hacking, hacking refers to the second definition breaking into computer systems. It can be assumed that hacking is

Related Documents