Ethical Hacking: The Different Types Of Hacking

1061 words - 4 pages

For much of the new millennia, computer network and security administrators have faced an ever-growing generation of evil, “Hackers.” Hackers wreak havoc on computer networks that do not have proper protection in place. They steal your information and sell it to the highest bidder, not thinking about what it would do to the person or company that they hacked. Let us take for instance, Edward Snowden, who is currently in Russia seeking asylum from the United States. Mr. Snowden illegally hacked the CIA network, stole classified documents, and sold them to the highest bidder. This type of hacking is known as an “inside hack,” as Mr. Snowden was on the inside when he illegally acquired the classified documents. Another form of hacking known in the technology world is called an “outside hack.” This type of hacking is when a user attempts to hack a remote server from a different location using various forms of hacking tools available on the internet. There is a form of “hacking” that exists today that is both legal and ethical. This form of hacking is referred to as, “Ethical Hacking.” Ethical hacking is doing legally what malicious hackers do: break in. (Simpson, 2010). Ethical hacking, when compared to traditional hacking, is legally and morally accepted because one must pass a series of rigorous exams and background checks to become certified and maintain their status, effectively use methods of hacking that is recognized by the industry, and provide awareness of current security issues within a network.
To become an Ethical Hacker, one must pass a series of exams designed to test the candidates’ knowledge of computer network protocols. “The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called Certified Ethical Hacker (CEH).” (Simpson, 2010, p. 6). Based off the CEH exam, 22 domains or categories are to be proficiently mastered in order to pass. This exam is the hardest and most challenging to complete. Another exam recognized in the industry is the CISSP (Certified Information Systems Security Professional). One of the requirements of this exam is that one must be sponsored by a user who already holds the CISSP title. This exam does not give you the Ethical Hacker title, but it proves that you are well versed in the computer network industry when it comes to network security protocols.
Both an Ethical and an Unethical Hacker use the same type of methods in order to achieve their intended outcome. In the world of hacking, there are three types of methods that most ethical and unethical hackers use when testing a network. (Hafele, 2004). These types of methods in the hacking community are called, “Box Models.” One of the methods, the White box model, is where the ethical hacker is given all the information about the network and must proceed from there with the tests. In this form, users of the network become aware that a test will be performed. Another method...

Find Another Essay On Ethical Hacking: The Different Types of Hacking

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages . Hackers. (2009). "Hackers Types." Retrieved 15 November, 2013, from http://www.hackersonlineclub.com/hackers-types. Jamil, D. and M. N. A. Khan (2011). "Is Ethical Hacking Ethical?" International Journal of Engineering Science 3. Pashel, B. A. (2006). Teaching students to hack: ethical implications in teaching students to hack at the university level. Proceedings of the 3rd annual conference on Information security curriculum development, ACM

Why Do Companies Need Ethical Hacking?

1411 words - 6 pages ethical hacker’s services. Companies will have different opinions about introducing ethical hackers into their business environments, these rival views can be resolved by using the RIMS strategy. Step1: Generate and evaluate arguments Arguments that arise • The argument that sees the need to hire ethical hackers. Hiring ethical hackers is to help improve the organization’s security system. They run thorough checks of the organization’s security

The Art of Hacking

1237 words - 5 pages all part of the group generally known as ethical hackers. These kinds of hackers help the FBI, or just mainly the government if needed be. They are the good kind of hackers who don’t have malicious intentions when hacking. However because of the bad hackers who put a bad name to them, they aren’t trusted either and are often misjudged. Conclusion Hackers are good but at the same time dangerous. It’s scary to think how easily someone can hack a

the benefit of hacking

1491 words - 6 pages Most people have heard the term “hacking” at least once in this digital age, and most of the time it is in a negative context. The reason for that is the definition of hacking is “gaining unauthorized access to a computer or program that does not belong to you.” That may sound bad, but it can actually be quite beneficial. Hacking can help improve digital security by finding the holes in it or help someone find wrongly hidden information. You see

The ABC'S of 'Hacking' Part 1

1832 words - 7 pages Hacking is a practice done by the samurai warriors aptly named 'Consultants' securing the information infrastructure of the future. With more patience and persistence than any real technical skill they pound for minutes on end configuring their networks and manipulating webs of other LANs laying LAN mines for future warriors to find and conquer that gauntlet of challenge kept alive in the unending game of cat and mouse.The nine steps of Hacking

The ABC'S of 'Hacking' Part 2

1421 words - 6 pages ARP PoisoningMain Issues:The Address Resolution Protocol's uses in detecting and rerouting traffic can cause havoc on a network where ARP's functionality is needed. ARP's capability of altering ARP tables at the switch makes it a prime target for hackers as point of entry in their attack. Because ARP works at both the network layer and the data link layer it can shutdown a network's data transfer with the outside world by confusing computers in

Hacking sweeps the nation

2641 words - 11 pages the modern-day hackers, because many have a whole different perspective on hacking, where it's not all just about personal gains rather it’s working as a group. A new revolution sweeping the nation is being described as “hacktivism”, and is said to be a whole new hybrid of fending for people’s human rights (Brandon, Pg. 1). This statement is true; the protesters have now managed to use hacking as a tool to get their message across, by

A History of Hacking

1697 words - 7 pages to help pay for protection and hackers of their own to help with developing viruses or finding where the hacker is located to bring down its attackers. Even today hacking is still seeing growth and according to, “Recent years have seen a substantial increase in both hacking industrial espionage conducted online, at tremendous cost to the victims and the nation economy.” So not only are hackers stealing files, but they majority affect the nation's

Hackers hacking the net

1321 words - 5 pages significant security breech in their popular 'web browser' (6).Hackers are compelled to break into government agencies such as the FBI, CIA, Secret Service and even the highest of them all the NSA (National Security Agency). Hackers enjoy hacking onto major 'online' services (normally called servers) that allow easy access to the Internet such as America Online, Compuserve and Prodigy. Hackers break into these government organizations or Internet servers

A Snapshot of Computer Hacking

1272 words - 5 pages their systems. Taking them from what may lead to a lifetime of crime, and changing them into ethical hackers. Ethical hackers also know as White Hats, are professionals that write codes to check the integrity of programs on behalf of the owners. The first computer hackers surfaced from MIT. (Focus Editors). The term hacking was borrowed from members of a model train club, who reconfigured the switches and rails to make the trains go faster. A

Hacking in the 21st Century

2740 words - 11 pages A countless number of today’s companies understand “hacking” is not just a crime, but a necessity to today’s internet security. “Microsoft and Facebook announced last November that they would pay bounties to ethical hackers for discovering vulnerabilities, not just in their own products, but in software systems that make up the internet infrastructure, as well” (Acohido par 3). Companies are soliciting outside computer specialists to illegally

Similar Essays

Ethical Hacking Essay

812 words - 4 pages related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks." It's true that hacking is mostly associated with undesired activities and intrusion. However, not all hackers are bad. There are, in fact, several types of hackers that exist; white hat hackers, black hat hackers, grey hat, elite, neophyte, blue hat, and hacktivist. Black hat hacker are

Cyber Hacking And Types Of Hackers

984 words - 4 pages could have taken anything. No one quite knows. So after that incident, the FED should and will take great measures to protect itself from cyber attacks. Let’s get an overview of what the Federal Reserve has to deal with: The history of cyber hacking and the many different types of hacking. A hacker is a person who looks to reveal problems in a computer system or network. Hackers might be motivated to do what they do because they could make a

Ethical Hacking And Ethical Hackers Essay

1703 words - 7 pages work, some people feel that the requirement for absolute trust eliminated such candidates. One rule that IBM's ethical hacking effort had from the very beginning was that they would not hire ex-hackers. The reasoning is would the government hire an ex-convict to become a policeman? One fundamental issue in the hiring of a hacker is ethics. After all, hackers are criminals. And in the UK, the inclusion of cyber crime in the Terrorism Act 2000

Is Ethical Hacking Truly Ethical? Essay

2751 words - 11 pages . The [unverified?] video showed U.S. soldiers killing ten Iraqi civilians and two reports from Reuters (“Robin Hood of Hacking”). I believe that Assange and the Wikileaks team released this video in an ethical attempt to stop the war in Iraq, and inform the world what was going on during the war in the Middle East, in contrast to reports made publicly available by the U.S. government. Given the U.S. government’s history of military cover-ups