Hello people !! Welcome you all to back my blogs . I have come with some interesting topic today . I am gonna give you guys a general idea of what is " Ethical Hacking " . Hacking is gaining un-authorized success to digital devices , computers , smart phones and even mass networks .
What is Ethical Hacking ?
It involves an authorized attempt to get unauthorized to a computer system , application or data . It involves duplicating strategies and actions of malicious attackers. The company that owns the system or network allows cyber security experts to perform such activities in order to test the system's defenses . Thus, unlike malicious hacking , this process is planned , approved and more importantly legal . Ethical Hackers are also known as “White Hats ” .
Key concepts of Ethical Hacking :
Staying legal by gaining prior approvals before accessing and performing a security assessment .
Notifying the vulnerabilities found during the assessments and provide remediation advice for resolving these vulnerabilities .
Defining the scope of the work , keeping the ethical hacker's work legal remaining within the approved boundaries.
Based on the data sensitivity , the white hats must agree to a non - disclosure agreement .
Types of hackers :
Black hat hackers
White hat hackers
Grey hat hackers
Script kiddie
Green hat
Red hat
Blue hat
Suicide hackers
Hacktivist
Cyber terrorist
New Terminologies :
Attack : It is an action that is done on a system to get its access and extract sensitive data.
Exploit : A method to intrude or penetrate in a system
Vulnerability : Weakness in a system [ hardware or software]
Payload : Malicious code inside the exploit is called payload .
Malware : It is malicious [intent ended to do harm] software which when enters the target host , gives an attacker full or limited control over the target .
Backdoor : a back door or a trap door , is a hidden entry to a computing device or software that bypass security measures , such as logins and password protections .
Hack value : the notion among hackers that something is worth doing . it is the reputation of the hackers .
Zero day : When a hacker finds a new vulnerability in a system and no one others know about it , that vulnerability or exploit is called zero day attack .
Limitations of Ethical Hacking :
One of the most drawback of ethical hacking is they cannot take actions quickly if it's beyond their permission levels . But it is not unreasonable to get a view out of the scope .
Illegal hackers do not have time constraints which ethical hackers often face .
They have to restrict their methods and ideas if the experts ask them avoid tests cases that may end wrong .
These are some of the basics of ethical hacking . If needed i will do part 2 of it . Thanks for reading !💙
Candlemonk | Earn By Blogging | The Bloggers Social Network | Gamified Blogging Platform
Candlemonk is a reward-driven, gamified writing and blogging platform. Blog your ideas, thoughts, knowledge and stories. Candlemonk takes your words to a bigger audience around the globe, builds a follower base for you and aids in getting the recognition and appreciation you deserve. Monetize your words and earn from your passion to write.