Similarities Between Hacking And Hacking

897 Words2 Pages

Contrast and compare Hacking vs Penetration Testing.

Hacking is a process in which one uses a computer or computer program to manipulate or exploit the weakness in a network system or a computer for the main purpose of causing harm, fear or make money. And a person who does this is called a hacker.
Hacking was first made popular by the M.I.T engineers during late 1950’s and early 1960’s. Most of the hackings that are done by these engineers is out of curiosity but not with an intention to create harm. But many people outside of the University started to use if for other purposes like manipulating the telephones to do cheap long-distance calls. Even though both hackers use their skillset to exploit the weakness of a computer or network system the intentions of their actions are different. One mainly using their skill out of …show more content…

These hackers have the same skill set and knowledge of computer or network system just like the black hat hackers, but they operate on the side of the public interest instead of creating chaos for the users. The white hat hackers do penetration testing for a company or an organization and try to find weakness in their systems. Their results are used by the security companies to develop security measures for the company or an organization before they are exploited by the hackers.
The penetration testing should be done to exploit the flaws and weakness of the security system throughout the environment, penetration must be done at the network level as well as the application level from both outside and inside the network. There are several advantages of doing penetration testing by a company or organization. Several of those advantages are stated below.
• Security vulnerabilities before a hacker does
• Gaps in information security compliance
• The response time of their information security team, i.e. how long it takes the team to realize that there is a breach and mitigate the

More about Similarities Between Hacking And Hacking

Open Document