CYBER SECURITY:
INTRODUCTION:
The Internet is as yet developing and online business is on its
progress. The immense development of Internet has brought numerous great
things like electronic commerce, email, simple access to tremendous
stores of reference material and so forth. An ever increasing number of
computers get associated with the Internet, wireless devices and
networks are blasting. Because of the propel innovation of the Internet,
the administration, private industry and the regular computer client
have fears of their information or private data being contained by a
criminal hacker. These kinds of hackers are called black hat hackers who
will covertly take the association's data and transmit it to the open
internet. In this way, to overcome from these real issues, another class
of hackers appeared and these hackers are named as ethical hackers or
white hat hackers. Along these lines, this paper portrays ethical
hackers, their aptitudes and how they approach helping their clients and
fitting up security openings. In this way, if there should be an
occurrence of computer security, these tiger groups or ethical hackers
would utilize similar traps and strategies that hacker utilizes yet in a
legitimate way and they would neither harm the objective frameworks nor
take data. Rather, they would assess the objective framework's security
and report back to the proprietors with the vulnerabilities they found
and guidelines
What is Hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access.
Example of Hacking: Using password cracking algorithm to gain access to a system
Computers
have become mandatory to run a successful businesses. It is not enough
to have isolated computers systems; they need to be networked to
facilitate communication with external businesses. This exposes them to
the outside world and hacking. Hacking means using computers to commit
fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cyber crimes cost many organizations
millions of dollars every year. Businesses need to protect themselves
against such attacks.
Who is a Hacker? Types of Hackers
A
Hacker
is a person who finds and exploits the weakness in computer systems
and/or networks to gain access. Hackers are usually skilled computer
programmers with knowledge of computer security.
Hackers are
classified according to the intent of their actions. The following list
classifies hackers according to their intent.
White hat
Ethical Hacking is identifying
weakness in computer systems and/or computer networks and coming with
countermeasures that protect the weaknesses. Ethical hackers must abide
by the following rules.
- Get written permission from the owner of the computer system and/or computer network before hacking.
- Protect the privacy of the organization been hacked.
- Transparently report all the identified weaknesses in the computer system to the organization.
- Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
-
Information is one of the most valuable assets of an organization.
Keeping information secure can protect an organization’s image and save
an organization a lot of money.
- Hacking can lead to loss of
business for organizations that deal in finance such as PayPal. Ethical
hacking puts them a step ahead of the cyber criminals who would
otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The
International Council of E-Commerce Consultants (EC-Council)
provides a certification program that tests individual’s skills. Those
who pass the examination are awarded with certificates. The certificates
are supposed to be renewed after some time.
click here to see some tools and terms you should know about hacking
:
Summary
- Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
- Cybercrime is committing a crime with the aid of computers and information technology infrastructure.
- Ethical Hacking is about improving the security of computer systems and/or computer networks.
- Ethical Hacking is legal.
(sources :wikipedia.etc)
Comments
Post a Comment