Google

Friday 19 September 2014

Ethical Hacking 101

Who is an Ethical Hacker?

An Ethical hacker or a “White-hat Hacker” is someone who“hacks” into the system of an organization or an individual for ascertaining potential dangers on their network.

What does an ethical hacker do?

An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers (Black Hat Hackers).
The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.


Ethical Hacking 101

But what if the hacker’s feet waver? Are there any regulations a hacker should follow?

In order for hacking to be deemed ethical, the hacker must obey the following rules.

1.      You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent.
2.      You respect the individual's or company's privacy and only go looking for security issues.
3.      You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time.
4.      You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.

What benefits apart from securing their networks do organizations derive from Ethical Hackers?

A hacker knows exactly how another hacker would try to compromise the network and hence would be armed with the appropriate defense techniques to prevent further breaches.
Another important aspect is the fact that a hacker would not charge as much money as a network security specialist would, but would more often than not, secure the network in a specialized fashion.



Great! So, how does one learn more?

Come to Koenig! We’re the leading IT Training Company in the world and offer the Certified Ethical Hacking (CEH) v8 course. To learn more, visit our website - http://www.koenig-solutions.com/

1 comment: