Eti Mic
Eti Mic
Introduction
An ethical hacker finds the weak points or loopholes in a computer, web applications or
network and reports them to the organization. So, let’s explore more about Ethical Hacking
step-by-step.Hacking is the activity of identifying weaknesses in a computer system or
a network to exploit the security to gain access to personal data or business data. An example
of computer hacking can be: using a password cracking algorithm to gain access to a
computer system.
Computers have become mandatory to run a successful businesses. It is not enough to have
isolated computers systems; they need to be networked to facilitate communication with
external businesses. This exposes them to the outside world and hacking. System hacking
means using computers to commit fraudulentacts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cyber crimes costmany organizations millions of dollars every
year. Businesses need to protect them selves against such attacks.
Who is a Hacker
We hear that attkeres are hacked the big companies and big systems. Sometimes ago, a hacker
hacked the Uber website. Due to this, the important information of around 50 million users
was exposed. Many big companies like Google,Yahoo, Instagram, Facebook, Uber, they hire
hackers. The hackers try to hack their systems.After hacking the system, they tell all the
places where they found the weakness so that the company can fix it. Many companies
also perform bug bounty programs. In this program,all the hackers around the world try to
hack the website or web of that company. If the hacker finds any bug, the company will pay
them are ward for the bug.Ethical hacking is used to secure important data from enemies. It
works as a safeguard of your computer from blackmail by the people who want to exploit
the vulnerability. Using ethical hacking, a company or organization can find out security
vulnerability and risks.
●Social engineering
●System hacking
2)Social Engineering
In the context of information security, social engineering is the psychological manipulation
of people into performing actions or divulging confidential information. This differs from
social engineering within the social sciences, which does not concern the divulging of
confidential information. A type of confidence trick for the purpose of information gathering,
fraud, or system access, it differs from a traditional "con"in that it is often one of many steps
in a more complex fraud scheme.
3)System Hacking
System hacking is a vast subject that consists of hacking the different software-based
technological systems such as laptops, desktops,etc. System hacking is defined as the
compromise of computer systems and software to access the target computer and steal or
misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a
computer system or network to gain unauthorized access toits data or take illegal advantage.
4) Miscellaneous Hackers
Apart from the above well-known classes of hackers, we have the following categories
of hackers based on what they hack and how theydo it –
3)Elite Hackers:
This is a social status among hackers, which isused to describe the most skilled. Newly
discovered exploits will circulate among these hackers.
4)Script Kiddie:
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged
automated tools written by others, usually with little understanding of the underlying
concept,hence the term Kiddie.
5)Neophyte:
A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking
or phreaking and has almost no knowledge or experience of the workings of technology and
hacking.
6)Hacktivist:
A hacktivist is a hacker who utilizes technology to announce a social, ideological,religious, or
political message. In general, mosthacktivism involves website defacement or denial of
service attacks.
Conclusion
In conclusion, ethical hacking is not a criminal activity and should not be considered as
such.While it is true that malicious hacking is a computer crime and criminal activity, ethical
hacking is never a crime. Ethical hacking is in line with industry regulation and
organizational IT policies. Malicious hacking should be prevented while ethical hacking
which promotesre search, innovation, and technological breakthroughs should be encouraged
and allowed.
Reference
https://www.scribd.com/document/637860346/Untitled
https://www.coursehero.com/file/148944081/18303-18361-Ethical-Hacking-ETI-
Project-2pdf/
https://www.collegesidekick.com/study-docs/2235489