Ethical Hacking: The Different Types of Hacking

819 Words2 Pages

For much of the new millennia, computer network and security administrators have faced an ever-growing generation of evil, “Hackers.” Hackers wreak havoc on computer networks that do not have proper protection in place. They steal your information and sell it to the highest bidder, not thinking about what it would do to the person or company that they hacked. Let us take for instance, Edward Snowden, who is currently in Russia seeking asylum from the United States. Mr. Snowden illegally hacked the CIA network, stole classified documents, and sold them to the highest bidder. This type of hacking is known as an “inside hack,” as Mr. Snowden was on the inside when he illegally acquired the classified documents. Another form of hacking known in the technology world is called an “outside hack.” This type of hacking is when a user attempts to hack a remote server from a different location using various forms of hacking tools available on the internet. There is a form of “hacking” that exists today that is both legal and ethical. This form of hacking is referred to as, “Ethical Hacking.” Ethical hacking is doing legally what malicious hackers do: break in. (Simpson, 2010). Ethical hacking, when compared to traditional hacking, is legally and morally accepted because one must pass a series of rigorous exams and background checks to become certified and maintain their status, effectively use methods of hacking that is recognized by the industry, and provide awareness of current security issues within a network. To become an Ethical Hacker, one must pass a series of exams designed to test the candidates’ knowledge of computer network protocols. “The International Council of Electronic Commerce Consultants (EC-Council) has develo... ... middle of paper ... ...se it fills a void inside them. Being an Ethical Hacker is a discipline that, when used properly and correctly, can be very rewarding both emotionally and monetarily. Works Cited Hafele, D. M. (2004, February 23). Three Different Shades of Ethical Hacking: Black, White and Gray. Retrieved from SANS Institute: http://www.sans.org/reading-room/whitepapers/hackers/shades-ethical-hacking-black-white-gray-1390?show=shades-ethical-hacking-black-white-gray-1390&cat=hackers Lin, C. M. (2008, Feburary 23). IT Literature Scans. Retrieved from University of Waterloo - CISA: http://uwcisa.uwaterloo.ca/Biblio2/Topic/Choy_Men_Lin_Ethical_Hacking_Final_Report.pdf Michael T. Simpson, K. B. (2010). Hands-On Ethical Hacking and Network Defense, 2nd Edition. In K. B. Michael T. Simpson, Hands-On Ethical Hacking and Network Defense, 2nd Edition (pp. 2-6). Boston: Cengage Learning.

More about Ethical Hacking: The Different Types of Hacking

Open Document