Topic > Ethical Hacking - 749

Who is a hacker? Most people see a hacker as someone who exploits vulnerabilities in electronic devices and system, network and computer to use them in malicious activities. About.com wrote "Hacking is any technical effort aimed at manipulating the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to technical work constructive and intelligent that was not necessarily related to Today, however, hacking and hackers are more commonly associated with malicious programming attacks on the Internet and other networks." It is true that hacking is mostly associated with unwanted activities and intrusions. However, not all hackers are bad. In fact, there are different types of hackers; white hat hackers, black hat hackers, gray hat hackers, elites, newbies, blue hat hackers and hacktivists. Black hat hackers are called crackers and “violate computer security for little reason other than malice or personal gain” (Moore, 2005). Today, most people who are not computer professionals use the term "hacker" to define crackers. Black hackers conduct illegal activities through computer. On the other hand, white hat hackers are considered "good" since they do not hack to harm others. Their intention is to study networks and computers with the hacker mindset to find vulnerabilities and weaknesses and provide advice on how to improve protection from black hat hackers. White hat hackers are often called certified penetration testers. This document will discuss white hat hackers or penetration testers. How do you become a white hat hacker? White hat hacking or penetration testing is a career in the IT field. Professions were born from needs. “Business… middle of the paper… ethical crime or ethical hacking. However, I believe that ethical hacking should exist.” An ethical hacker is usually employed by an organization that trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of identifying and fixing cybersecurity vulnerabilities." (Wikipedia) In other words, white hat hackers do not hack into systems without authorization and permission Furthermore, the findings revealed through hacking are used to improve the system, thus building a more secure system. Again, companies and governments hire penetration testers to identify security risks, threats and vulnerabilities of networks, systems, software and develop intrusion detection systems and antivirus programs, and software distribution tools. Ethical hacking, therefore, should be seen and respected as a professional career.