Tuesday, 22 July 2014

Ethical Hacking

Ethical Hacking is breaking into the Computer information system to identify any loopholes and rectify the system and to report any vulnerability in the system, it is Legal and these hackers possess certain skills which are put to use as per the requirement. Ethical hacking helps an individual identify potential threats on the computer or network.

Hackers are divided based on their knowledge as

Coders: They are extremely skilled people with good programming knowledge and who know what they are doing. Good understanding of coding and the outcome of the code.
Admins: They are aware of what is expected of them, they make the work of coders easy by monitoring and guiding, they do not have knowledge of coding.
Script Kiddies: They are basically hackers with little experience and do not know the outcome of coding, sometimes could cause severe damage due to their lack of experience.

Hackers based on their Legality

White Hat Hackers: A hacker who specializes in testing and security methodologies, licensed to work with high pay scales, the good hacker.
Black Hat Hackers: Dangerous people with a wrong intent to earn money or destroy the security system, he is the bad hacker. They could be anybody from the coders, admins or script kiddies.
Grey Hat Hackers: This hacker generally involves himself in good and bad activities could be a white or black hat, and mostly could be the ‘admin’, as he has the opportunity to indulge in such activities.

Hacking with a malicious intent is ‘Cracking’, and it is used by breaking into Computer Systems for personal or commercial gains, for posting harmful or malicious content causing damage to the information and systems.

The important measures to be taken to avoid hacking with a malicious intent are adopting certain Security and counter measures, using effective Anti-Viruses, properly logging out after using mails, opening the browser manually, refraining from opening any spam files and maintaining proper password protection for all the administrator accounts. 

No comments:

Post a Comment

Popular Posts