ETHICAL HACKING


BY: DARYLL HANNAH PADILLA


What is Ethical Hacking?


According to TechTarget, Ethical hacking is a computer and networking professional who thoroughly attempts to break through a computer system on behalf of its owners for the purpose of finding safety vulnerabilities that a malicious hacker could potentially take advantage of. They are using the same methods and techniques to bypass and lower a system’s defenses as their counterparts by documenting them and providing actionable advice on how to improve its overall security rather than taking advantage of its data. They are also known as “white hat hackers” because they break into systems legally and ethically. This is the primary difference between “ethical hackers” and “real hackers” – the legality. Ethical hacker is defined as “an individual who is usually working with the organization and who can be trusted to assume an attempt to go through computer systems using the same methods and techniques as a Hacker”. Ethical hacking is a widespread term that covers all hacking techniques, and other related computer attack techniques. So, along with discovering the security flaws and vulnerabilities, and ensuring the security of the target system, it is ahead of hacking the system but with consent in order to maintain the security for future purpose.


What is the purpose of Ethical Hacking?

The purpose of ethical hacking is to guess the safety of a computer’s system infrastructure entailing, discovering and attempting to take advantage of any vulnerability to determine whether unauthorized access or other malicious activities have potential to steal so they required possessing a vast arrangement of computer skills. Vulnerabilities tend to be found in poor or inappropriate system configuration, known and unknown hardware or software flaws, and equipped weaknesses in process or technical countermeasures. While hacking, you concentrate on attacking networks and computer systems from the start. For examples- scanning ports, examining known defects and piece installations and prevents malicious hackers. A complete blow ethical hack might contain emailing staff to ask for password information, rummaging through executive’s data and usually breaking and entering, without the awareness and consent of the targets but a successful test doesn't necessarily mean a network or system is 100% safe and sound, but it should be able to withstand programmed attacks and inexperienced hackers.

What is the Advantages and Disadvantages of Ethical Hacking? 

Being an Ethical Hacker has its upside and downside; as said above, Most of the benefits of ethical hacking is obvious, but many are overlooked. It includes fighting against terrorism and national security breaches, having a computer system that prevents malicious hackers from gaining access and having adequate preventative measures in place to prevent security breaches. The probable drawbacks of ethical hacking includes; the ethical hacker using the knowledge they gain to do malevolent hacking activities, allowing the company's financial and banking information to be seen, The opportunity that the ethical hacker will send and/or place malevolent code, viruses, malware and other negative and destructive things on a computer system and huge security breach. These are not common; however, there should be slightly , companies should consider when using the services of an ethical hacker.

Comments