What is hacking?Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose
Then who is an hacker?In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
When we say hackers, so many things comes into mind. We try to show fear that has been implanted by the media. Hackers are not always criminals. There are several types of hackers which people are not aware of, the most popular one is the black hat.
Well there are 3 basic categories of hackers:
White hat --– skills used for
defensive security analysts
grey hat--– offensively and
defensively; will hack for different
reasons, depends on situation.
black hat--highly skilled,
malicious, destructive
This brings us into Ethical Hacking. What is Ethical Hacking?
Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
Who is an Ethical Hacker?The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker.
What do hackers do?An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:
What can an intruder see on the target systems?
What can an intruder do with that information?
Does anyone at the target notice the intruder’s at tempts or successes?
What are you trying to protect?
How much time, effort, and money are you willing to expend to obtain adequate protection?
Several hack attacks are on the media, those attacks wouldn't have occurred if there hasn't been a loop hole, that is why an ethical hacker is required to access your loop hole and recommend the best solution, after it has been resolves will re analyze the systems, or application involved. All required to know about how to enhance their security, the only person exempted is a toddler and a small baby. As long as u use a computer device, mobile phones, bluetooth, ATM, email any network and electronic device you can be hacked and you need to know how to use it securely and how to detected if it has been compromised.
For more tips on security please feel free to visit:
http://cyberinfocts.blogspot.com