The Importance Of Ethical Hacking

Improved Essays
CHAPTER IILiterature ReviewEthical Hacking and Its Importance
The word hacking is used to defined as the computer criminals. Using illegal actsand have malicious intent. Hacker is the one who doing the hacking process. Hackers usetheir skill in programming and their enjoying the work in learning the details of thecomputer systems and stretch capabilities from the system. The word cracker also belongs to the same field that also uses hacking skills for the unlawful purposes likeemail id, intrudi ng other’s system.
Crackers break system with malicious intent. They areout of personal gain, fame, profit and even revenge. They modify delete, delete and stealcritical information, often making other people miserable. Hacking has different typessuch
…show more content…
They are the good guys also known as the white hat hackers and opposed tothis are the bad guys that called black hat hackers. If you are curious with the white hatand black hat terms that came from Westerns in which the good guys wore white cowboyhats and the bad guys wore black cowboy hats. There are also grey hat hackers that are alittle bit of both. Whatever the case, most people give hacker a negative connotation.An ethical hacker is a person doing ethical hacking, security personnel that tries to penetrate in to a network to find if there is vulnerability in system. Ethical hackers alwayshave the permission to enter into the target network and they will think first with amindset of a hacker who tries to get in to the …show more content…
The saidrequirements above are the required skills of ethical hackers. Of course, if you want to bean Ethical hacker someday, you need to have those following requirements and varietyskills. Being an Ethical hacker typically have a very strong programming and computer networking skills and have been in the computer and networking business for severalyears.The white hat term in Internet slang refers to an ethical computer hacker, or acomputer security expert that specializes in penetration testing and in other

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Penetration tests assesses the overall security. It is the process of attempting to gain access to resources without knowledge of specific user names, their passwords, or other normal means of access (similar to what an attacker would do). The big different between a penetration tester and an attacker basically is permission. A penetration tester will already have some permissions (such as an normal user account) in place from the owner or managers of the computing resources that are to be tested. From here, the pen tester will attempt to gain additional accesses.…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hacker access, activist access, an insider attack. Hacker access involves an outside entity gaining access to the network via unpatched systems, vulnerability, or by any other technical means. Activist access consists of a hacker affecting the network maliciously with a political or moral agenda in mind. Insider attack can be the most dangerous of the three. This involves someone within the organization do harm to the network using the credential or access they were granted to perform their regular duties.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 5 Assignment

    • 526 Words
    • 3 Pages

    Age - 17 Country - England Time zone - Greenwich Mean Time Zone (UTC+00:00) InGame ranks (Mine rank and Donation Rank,only if you have one) - Ether & Hitman On Prison. 1. Why do you want to be staff? - I enjoy playing on Cyclone and also the community is awesome.…

    • 526 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The recent airing of Ashley Madison's dirty laundry continues to be a hot topic around the internet. Two weeks ago, a group of hackers calling themselves 'Team Impact', breached the security of the controversial dating website and made away with the information of millions of users. Many outlets have combed through the near 10 gigabytes of data dumped by Team Impact onto the dark web, but this find from Gizmodo stands out.…

    • 291 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    Terrorists. We all know what the meaning of the word means. The FBI started investigating a shooting in San Bernardino, California and recently found the shooters phone and they need Apple to hack into it. Yet, Apple to refusing to hack into it. Why?…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    That stomach churning feeling of guilt for many, seems to appear as a small price to pay when completing an act of academic dishonesty. Colleen Wenke wrote an essay on cheating eighteen years ago called “Too Much Pressure”. Although, In the past fifty years, students who admit to having cheated has increased fifty to seventy percent(stanford.edu) Today, the number of students who cheat has risen because it is no longer seen as a large infringement on the school system that one should be punished for. Therefore, it is an easier way to receive the grade that one feels will lead them to ultimate success.…

    • 837 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    What is right or wrong is whether or not they get punished and their needs were satisfied (Taylor, Fritsch, & Liederbach, 2015). Ex: Hacking is a digital crime, whether it be for status quo, pleasure or criminal intent, all aspects of hacking is considered a digital crime. Most hackers, hack for status quo or pleasure, and feel as if they are not committing a crime as no harm is done. While some computer and of digital communication intrusion is caught, there are much that goes un-noticed, and unpunished. Leaving Hackers in the mindset that their criminal acts are acceptable and correct, as their needs are satisfied, and their criminal acts go unpunished.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays