Author Topic: What you need to know about Hacking  (Read 1620 times)

0 Members and 1 Guest are viewing this topic.

Offline Pro Ethical Hacker

  • Posting For Fun!
  • **
  • Posts: 5
  • Gender: Female
    • View Profile
    • Cyber Information Communication Technology Services
What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose

Then who is an hacker?
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

When we say hackers, so many things comes into mind. We try to show fear that has been implanted by the media. Hackers are not always criminals. There are several types of hackers which people are not aware of, the most popular one is the black hat.
Well there are 3 basic categories of hackers:
White hat --– skills used for
   defensive security analysts

grey hat--– offensively and
   defensively; will hack for different
   reasons, depends on situation.
 
black hat--highly skilled,
   malicious, destructive
This brings us into Ethical Hacking. What is Ethical Hacking?
Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”

In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.

Who is an Ethical Hacker?
The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker.

What do hackers do?
An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:
What can an intruder see on the target systems?
What can an intruder do with that information?
Does anyone at the target notice the intruder’s at tempts or successes?
What are you trying to protect?
How much time, effort, and money are you willing to expend to obtain adequate protection?


Several hack attacks are on the media, those attacks wouldn't have occurred if there hasn't been a loop  hole, that is why an ethical hacker is required to access your loop hole and recommend the best solution, after it has been resolves will re analyze the systems, or application involved.  All required to know about how to enhance their security, the only person exempted is a toddler and a small baby. As long as u use a computer device, mobile phones, bluetooth, ATM, email any network and electronic device you can be hacked and you need to know how to use it securely and how to detected if it has been compromised.

For more tips on security please feel free to visit: http://cyberinfocts.blogspot.com


Offline Perfect

  • Cokoye
  • *****
  • Posts: 8297
  • Gender: Male
    • View Profile
    • Africa Online Forums Nigeria | Ghana forum| Kenya Communites| Uganda
Whether good or bad hacker is hacker it bothers on the direction the hacker wants to go (positive or negative). Meaning you must know black hacking to work effectively as ethical hacker.

Offline Pro Ethical Hacker

  • Posting For Fun!
  • **
  • Posts: 5
  • Gender: Female
    • View Profile
    • Cyber Information Communication Technology Services
 what you do with your skills makes it either black or white. There are several skill and tactics which is useful in our day to day activities. Though when undergoing the training all the methodologies in hacking and approach to hacking will be taught. The aspect of black hat hacking targets human weakness using social engineering exploiting the victims PC, Bank logins, Email, social network(facebook,twitter) info..... using deceptive tools. A script kiddies can be a black hat hacker doesn't need to know everything before he can hack anyone. But functioning as a white hacker is more challenging you need to acquire all the necessary skills.

Offline Perfect

  • Cokoye
  • *****
  • Posts: 8297
  • Gender: Male
    • View Profile
    • Africa Online Forums Nigeria | Ghana forum| Kenya Communites| Uganda
That is exactly my point, ethical hacking requires far deep knowledge and pedigree about hacking than black hacking. That is to say it involves extensive and serious study for one to qualify as ethical hacking expert.


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
What is 10+10? Give answer in words e.g. Five::

Related Topics