Wednesday 17 October 2012

Hacking


White Hat Hacker

The people who analyse and attack the security system of an organization with the intention of finding and exposing weaknesses that crackers can exploit and take advantage of are the computer and network experts called Ethical or white hat hackers. It is important to understand that unlike crackers, ethical hackers get permission from the relevant authority to go on and test the security of their information system. Crackers cause harm and loss to an organisation and affect negatively to the integrity  availability and confidentiality of an information system.
organisations want to use the internet for eCommerce and web development. On the other hand governments want to use these resources to distribute information to its citizens. Even though they want to utilize this new potential that has been enhanced by technology there is fear of security. Organisations fear the possibility of their computer information system being cracked and accessed by unauthorized people. On the other hand potential customers and users of these services worry about the safety of the information they are prompted to give. They fear that these information like credit card numbers, social security numbers, home addresses and contacts will be accessed by intruders or outsiders who are going to use their data for other purposes outside the one that was intended. By so doing their privacy is going to be inter feared with, something that is not desirable to many people if not all.
Due to the above raised fear, organisations sought to find a way to approach and counter this problem. They came to discover that one of the best methods they can use to limit and control the threat posed by unauthorized personal to a security system is to employ independent professionals in security matters to try the security measures of a system. In this scheme, hackers use the same tools and techniques used by intruders but they do not damage the system nor do they steal from it. They evaluate the system and report back to the owners the vulnerabilities their system is prone to. They also recommend what needs to be done to the system so as to make it more secure.

Black Hat Hacker 

This type of hacker misuse their ability to conduct computer crime. Ranging from theft of credit card numbers, to damage the server state-owned companies, ISPs, and others. Because their actions tend to be in conflict with the officers, network administrators, as well as hacker-hacker "white hat".

When the evil hackers do actions have akan hacker "white hat" who offer services to victims of malicious hackers to track this. And some hackers "white hat" to give the term for malicious hackers with "cracker".
Originally hacker groups do not start with the career criminal motivation, they usually start hacking career with curiosity. However, in the journey to start thinking misuse what they have learned in the early career of hacking them.




Share/Bookmark

1 comment:

  1. I think the earlier commentators are likely correctly, That's impressive, keep that right up I am wanting just for your the next site! website design Toronto

    ReplyDelete