Ethical Hacking And Information Security

2390 Words Nov 10th, 2016 10 Pages
Ethical Hacking and Information Security

Merriam-Webster defines Hacker as, a person who secretly gets access to a computer system in order to get information, cause damage. But what if I told you that having a hacker is necessary? Ethical Hacking is paramount to the security of our Information Technologies (IT). The task of testing your computers and network for security vulnerabilities and plugging the vulnerabilities you find before the opposition gets a chance to exploit them. Without having the ability to do what devious personnel can do inside your IT, you will never fully understand the holes in your security.

It all began in the 1960s at MIT, origin of the term “hacker”, but the science dates back to 1903 to the first ever documented hacking of an electronic device. In 1932, Marian Rejewski hacked the German Enigma Machine. The Enigma machine was an electromechanical device, equipped with a 26-letter keyboard and 26 lamps, relating to the letters of the alphabet. Inside was a set of wired drums (rotors and a reflector) that jumbled the input. The Enigma used a plug-board to swap pairs of letters, and the encryption varied from one key press to the next. For two operators to communicate, both Enigma machines had to be set up in the same way. The large number of possibilities for setting the rotors and the plug-board combined to form an exponential number of configurations, and the settings were changed daily, so the machine code had to be "broken each day. Marian’s…

More about Ethical Hacking And Information Security

Open Document