By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 1230 |
Pages: 3|
7 min read
Published: Feb 13, 2024
Words: 1230|Pages: 3|7 min read
Published: Feb 13, 2024
Security of information is a matter of prime concern in today’s information based economy. We need to protect our data from hacking. Hacking is a process to utilize weakness in the system and gaining unapproved access to data and system resources. When business connect their systems and computer, despite of having many security setups, it raises a greater potential for security issues such as data loss, security breaches, malicious attacks. The objective of this paper is to describe types of ethical hackers, need of ethical hacking, steps in security testing plan and to implement measures to reduce vulnerability to unauthorized access or damage of information.
The information security is designed to protect confidentiality, integrity and availability of system data from those with malicious intentions. The increased use of internet has given an entrance to many things like twitter, LinkedIn, snapchat, Instagram, Weibo, QZone, online shopping and information distribution which invites hackers to exploit personal information. So, the demand of ethical hacking is to protect the system from the destruction caused by the hackers.
They are the computer programmer who has knowledge of computer programming and they have enough information on the system they are about to hack.
Hacking indicates the process of unauthorized intervention into a computer or network. Targeting specific machine for hacking should follow the five steps.
It is the first step where hacker collects the information about the object.
This step involves exploring the information gathered during survey step and using the same to inspect the object. Hackers can use the automated tools during investigate phase which includes Unicornscan, NMap, Angry IP Scan, Nikto and Aircrack.
Gaining Entry: The actual hackings are taken in this step. In this the hacker can exploit vulnerabilities unveiled during survey and investigate phase.
Retain Access: Using malwares like rootkits, backdoors and trojan, the hackers keep the gained access for future exploitation.
Covering Track: In this step, the hackers cover their track and traces to skip detection.
After the terrorist attack of 11th September 2001, the need of IT professionals came into existence. These peoples are hired by companies to expose loop holes in security and then advise on how to fix them.
Hackers are varied diverse creatures and are of seven types:
Malware is any software intentionally designed to damage computer network or server. Malware does the damage after it is implanted or introduced in some way into a target’s computer and can take the form of executable code, scripts, active content and other software. Malware are of following Kind:
The ethical hacking process needs prior planning of imperative and skillful issues. This is important for testing such as login test, web application test, physical penetration test, network services test. The security setup plan includes following steps:
Defense strategies for every network will vary. For every organization, it is useful to prevent information from an attacker.
Active reconnaissance can be restricted by implementing network defenses. It is difficult to remove active reconnaissance completely when services are provided to the outside world by means of internet. Active reconnaissance prevention includes:
It is an attempt to gain information about targeted computers and network. Preventing passive reconnaissance techniques includes:
The ever-evolving digital age is affecting information security immensely. As the technology is expanding the cybercrimes are increasing. Fortunately, the ability to counter cybercrimes has been developed. By being dependent on technology we are giving cyber criminals an invitation into our world through our identities, our bank accounts, and other important information. This paper highlights the work of ethical and malicious hackers. The ethical hackers maintain security, help us to understand organization security needs. On the other hand, malicious hacker intrudes the organizations security illegally and provide harm to the network for their personal benefit. If we analyze both the hackers bring forward the hidden security lapses of an organization. This information is used by the ethical hackers to make their clients understand their security needs.
Browse our vast selection of original essay samples, each expertly formatted and styled