Ethical Hacking : A Breach Of Security

1457 WordsDec 11, 20156 Pages
Every day in the news we hear or read about another company that has had a breach of security in their network. These breaches lead to large amounts of stolen or compromised information as well as the loss of services within that company. In many of these cases the breach could probably been prevented had the company been able to find the vulnerabilities in the network. This is where ethical hacking comes into the program. Before delving into ethical hacking we must first understand what hacking really is. As defined by dictionary.com hacking means to modify a computer program or electronic device in a skillful or clever way: or to break into a network, computer, file, etc., usually with malicious intent.[1] Hacking is performed by a person or group of people know as hackers. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.[2] There are several variations of hackers and all of them are referred to by a color of hat. We will start with the “White Hat”. These are generally the ethical hackers someone who for non-malicious reasons will break into their own security system for testing purposes. This classification
Open Document