Ethical Hacking: It’s not an oxymoron.

Join Cybrary

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

< Back to Blog Posts

Ethical Hacking: It’s not an oxymoron.

Published: June 8, 2015 | By: Rachel Laura M | Views: 3048
save

When most people think of a hacker, they think of a dishonest individual who uses techniques to bypass a system’s defenses and steal confidential and sensitive information. Security breaches, data as well as identify theft are all incidents which can occur as a result of a hacker breaking into a system. However, in this modern workplace where information can be distributed and leaked in seconds, there exists the ethical hacker. Sounds like an oxymoron to you? Well, it isn’t! In fact, the ethical hacker is a great asset and help in today’s increasingly technologically (and less human reliant) work place.

Known as ‘white hat hackers’, ethical hackers use the same techniques as their less-than-honest counterparts, the ‘black hat hackers.” However, these good guys of cybersecurity do not use their findings to take advantage and exploit any vulnerabilities they discover, rather they document them and then present their client with a plan on how to repair these issues so the company can improve their overall information security and guard their important information.

Ethical hacking exists to assess the security of a network or system infrastructure and consists of discovering and trying to exploit vulnerabilities. This helps to determine is unauthorized access or other malicious activities are possible. Poor or improper system configurations, hardware and software flaws (known and unknown) as well as operational weaknesses in technical countermeasures are all places that tend to have vulnerabilities.

The history of ethical hacking can be traced back as early as the 1970s. The United States government used groups of experts known as ‘red teams’ to hack into its own computer systems. Since its inception back then, ethical hacking has become a sizable part of the information security market and is rapidly expanding. In fact, many large companies such as IBM employ their own team of ethical hackers and many information security companies offer ethical hacking as a service.

It is of great importance as an ethical hacker to make sure they know a company’s service level and code of conduct agreements, which gives specific instructions to how testing will be conducted. For instance, there have actually been incidents of ethical hackers testing a system and discovering vulnerabilities without the owner’s permission. Ethical hacking is also known in the market as penetration testing, as many professional in this field feel that ethical hacking is a contradiction in terms.

As this field is advancing and growing so quickly, it is crucial for security professionals to be in top of the latest techniques so they can offer the best services to their clients and stay on the top of their profession. There are many resources available to learn both in traditional classroom formats as well as online. A good free resource is our course lesson on system hacking. These online courses allow the participant to study and learn at their own pace and suit a variety of learning styles.

< Back to Blog Posts
Enjoy this blog post? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter Google+ LinkedIn Email
Join Cybrary
7 Comments
Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel