Tuesday, July 26, 2011

Hackers and Ethical hackers

Hackers are actually good, pleasant and extremely intelligent people who could keep computer criminals on the run

Employing ethical hackers to protect against malicious ones has become common practice in the US, but has only recently caught on in India.

It only really got going when the Reserve Bank of India directed its banks to use "ethical hackers" last year

"It was done after several Pakistan-based hackers launched some sort of cyber war against India and the sites belonging to the Ministry of External Affairs and the Atomic Energy Research Board were hacked,"

However, there is still no organised body to guard against such practice.

Ethical Hacking course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only.

An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.

But there's another breed of hacker out there, one who works at foiling the efforts of the troublemakers. Unlike the hackers who attempt to break into corporate networks for sport and spying purposes, so-called ethical hackers typically hire themselves out to perform "vulnerability assessments" for clients — meaning they essentially break into the client's computer network with the client's consent in the interest of patching up security holes. . . .

Companies ranging in size from startups to International Business Machines Corp. have ethical-hacking teams. Computer-security services, including vulnerability assessments by ethical hackers.

No comments:

Post a Comment