- Get link
- X
- Other Apps
Most Recent Post
- Get link
- X
- Other Apps
Hello friends this is Subhash Chandra from #technicalbose .Today we talk about Ethical Hacking ,course and scope.
What is Ethical Hacking ?
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming.
Every Hacker is driven by their own set of personal goals and objectives .Hackers are generally differentiated by their mythologies and skills practice. Common practice puts hackers in three board categories based on their mythologies: white hat hackers or ethical hackers,black hat hackers and grey hat hackers . Now Let's understand them in some detail.
White Hat Hackers:
These are the guys you had want to your side.Also called ethical hackers ,these individuals are cyber-security experts who are hired and paid by companies and governments to perform penetration testing and discover flaws and gaps in the entity's organization wide computer system.with good intentions and necessary clearance, they hack into the system and find out vulnerabilities.All of this is done to ensure protection against black hat hackers and other malicious cyber crimes.
Black Hat hackers:
These guys are your culprits .Heard a piece of news about a new cyber crime today ,it's the black hat hackers who are behind all of them.
Monetary gains sentience most black hat hackers ,but it's not the only reason .Airport system ,banks ,PCs, or any network based software system can become their potential target .They exploit vulnerabilities and gain unauthorized access to your personal ,financial and technical data .Sometimes the goal is notoriety in their own circles, or even public fame ,But usually it all boils down to desiring power and money.
Grey Hat Hackers :
Grey Hat Hackers lie somewhere between white and black hats hackers . They break into system without consent ,but if they find any loopholes or backdoor,they bring it to the attention of the authorities or propose to fix then in exchange for financial rewards. There have been numerous instances where the grey hat hackers ,on denial of rewards ,have leaked the vulnerability onto the internet for the whole world to see.
Since a grey hat hackers does not cross that lines of using their expertise for personal profit, however blurry that line might be , they stay away from the black hat label .However, since they can't be called a white hat hacker either and are therefore subject to judicial punishments.
Careers:
The growth of data centered marketing and economy has also led to increasing demands for cyber security experts. Breaches are becoming more significant that ever ,and people are getting more and more concerned about their privacy and their data .And this where ethical hackers come in.
Comments
Post a Comment