Ethical Hacking-An emerging concept

Ethical-Hackers-Of-The-WorldEth­i­cal Hack­ing Con­cept: Eth­i­cal hack­ing is the term used to describe hack­ing per­formed by a com­pa­ny or indi­vid­ual to help in iden­ti­fy­ing poten­tial threats on a com­put­er sys­tem or net­work. An eth­i­cal hack­er attempts to bypass way past the sys­tem secu­ri­ty and search for any loop­holes that may be exploit­ed by mali­cious hack­ers. This infor­ma­tion is then used by the orga­ni­za­tion to improve the sys­tem secu­ri­ty, to mit­i­gate, min­i­mize or elim­i­nate, any poten­tial risks of attacks.

In order for hack­ing to be deemed eth­i­cal, the hack­er must main­tain the fol­low­ing principles:

  1. Expressed (often writ­ten) per­mis­sion to probe the net­work and attempt to iden­ti­fy poten­tial secu­ri­ty risks.
  2. You respect the indi­vid­u­al’s or com­pa­ny’s privacy.
  3. You close out your work, not leav­ing any­thing open for you or some­one else to exploit at a lat­er time.
  4. You let the soft­ware devel­op­er or hard­ware man­u­fac­tur­er know of any secu­ri­ty vul­ner­a­bil­i­ties you locate in their soft­ware or hard­ware if not already known by the company.

Eth­i­cal Hack­er Con­cept: An old con­cept was that hack­ing is hack­ing, no mat­ter how you look at it and those who do the hack­ing are com­mon­ly referred to as com­put­er crim­i­nals. How­ev­er, the work that eth­i­cal hack­ers do for orga­ni­za­tions has helped improve sys­tem secu­ri­ty and can be said to be quite suc­cess­ful. Indi­vid­u­als inter­est­ed in becom­ing an eth­i­cal hack­er can work towards a cer­ti­fi­ca­tion to become a Cer­ti­fied Eth­i­cal Hack­er or CEH. This cer­ti­fi­ca­tion is pro­vid­ed by the Inter­na­tion­al Coun­cil of E‑Commerce Con­sul­tants (EC-Coun­cil).

Leave a Reply

Your email address will not be published. Required fields are marked *