This website uses cookies to ensure you have the best experience. Learn more

Ethical Hacking Essay

2587 words - 11 pages

BASIC NEEDS FOR
HACKING
1. Learn about hardware - basicly how your computer works.
2. Learn about different types of software.
3. Learn DOS.(learn everything possible)
4. Learn how to make a few batch files.
5. Port scanning. ( download blues port scanner if it's your first time)
6. Learn a few programming languages
HTML,C++,Python,Perl.... (i'd recommend learning html as your first lang)
7. How to secure yourself (proxy,hiding ip etc)
8. FTP
9. TCP/Ip , UDP , DHCP ,
10. Get your hands dirty with networking
11. Learn diassembler language (its the most basic language for understanding machine language and ...view middle of the document...

An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers.

GENERAL HACHING METHOD
A typical attacker works in the following manner:
1. Identify the target system.
2. Gathering Information on the target system.
3. Finding a possible loophole in the target system.
4. Exploiting this loophole using exploit code.
5. Removing all traces from the log files and escaping without a trace.

CONCEPT OF ETHICAL HACKING
The Art of exploring various security breaches is termed as Hacking.
Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.
In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.
Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.
The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and
Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, Pimplefaced Teenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they are often very Sharp Minded

Hacker vs. Cracker
A Hacker is a person who is interested in the working of any computer Operating system. Most often,
Hackers are programmers. Hackers obtain advanced knowledge of operating systems and programming
languages. They may know various security holes within systems and the reasons for such holes.
Hackers constantly seek further knowledge, share what they have discovered, and they never have intentions about damaging or stealing data.

A Cracker is a person who breaks into other people systems, with malicious intentions. Crackers gain
unauthorized access, destroy important data, stop services provided by the server, or basically cause problems for their targets. Crackers can easily be identified because their actions are malicious.
The basic difference is hackers do not hacking with malicious intention I do anything disastrous.
Cracking yield more...

Other assignments on Ethical Hacking

Busn 460 Essay

489 words - 2 pages user would urinate or deposit saliva on a microchip and the app would tell them if they are infected. They would then go and securely get their results offline without ever having to see a doctor. This raises so many ethical and moral concerns, not to mention the security issues of having your DNA uploaded to a database. Cache, J., Wright, J., & Liu, V. (2010). Hacking Exposed Wireless : Wireless Security Secrets & Solutions. New York

Cyber Security Essay

317 words - 2 pages Why Hire Me? _____________________________________________________________ I am a highly motivated and professional Security Engineer with (Linux Professional Institute (LPI 102) certification and willing to pass CEH Certified Ethical Hacking). Capable of delivering at the highest level. With excellent interpersonal skills, I am confident in my ability to become the most valuable member of your company. I have developed expertise in networks

The Differences Between Ethics And Law

552 words - 3 pages Guideline: As a guideline to computer users. Moral Standards: Ethical behaviour is judged by moral standards. Free To Follow: Computer users are free to follow or ignore the code of ethics. No Punishments: No punishment for anyone who violates ethics. Universals: Universal, can be applied anywhere, all over the world Produce Ethical Computer Users: To produce ethical computer users. Immoral: Not honouring computer ethics means ignoring the moral

Social, Legal, And Ethical Issues In The Information Age

5310 words - 22 pages security function of a company. Many security experts have related outsourcing security to outsourcing payroll. They are both functions that must be performed, but the expertise and efforts of the employees are better suited to the core business than to these tasks. 5. Is it ethical to hack? Is it ethical to use tools that are freely available on the Web to hack? What should be the punishment for hackers? Hacking is simply the

Chemophobia

655 words - 3 pages  Institutions  Food Inflation Green Chemistry Impact of tourism on environment. Indias Iron ore Mandatory rural service for doctors before conferring a degree Online eduction vs traditional system of education Poverty is a state of mind Social Media and Politics Todays food and health Work-Life balance Apps are a waste of time Capitalism is a  flawed system but the others are so much worse  Corporate Social Responsibility Electoral Reforms Ethical

Case Stury

4098 words - 17 pages  pervasive confusion among plaintiffs and defendants alike. The goal of this study  is to show just that: to highlight the ambiguity of the law through examples, to discuss the stiff  legal repercussions these hacktivists have faced, and to consider the dialogue between the news  media and the general public about the appropriateness of criminal sentencing and the nature and  motives of hacking incidents.  For those wishing to reform the law

Redn

2424 words - 10 pages . a deliberate breach of our security or even hacking into our computer systems. As an outcome of the plan, we make sure that we store all our critical information in a few different central servers rather than just on the Tesco’s server. Analysis of legal, ethical and operational issues in relation to the use of business information The legislations put in place by the government is the law and compulsory to be followed by Tesco, however

Management

9111 words - 37 pages plague online commerce include all of the following EXCEPT A) inappropriate gifts B) spreading viruses C) identity theft D) internet fraud E) hacking into company computers Answer: A Diff: 2 Page Ref: 312 AACSB: Ethical Understanding and Reasoning Abilities Objective: 10.01 Explain why good ethics is good business in strategic management. Learning Outcome: Discuss the roles of ethics and social responsibility in strategic management

Cyber Law

3963 words - 16 pages cyber crime. (a) One definition says that ‘cyber crime’ consists of only those offences provided in the Information technology Act, 2000. As per this definition, cyber crimes would mainly be restricted to tampering with the computer source code, hacking and cyber pornography. Cyber fraud, defamation, harassment, e – mail abuse and IPR thefts, would not classify as cyber crimes. (b) In second definition, ‘cyber crime’ is said to be an act of

Ethics

3009 words - 13 pages corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new

Whistleblowing

3746 words - 15 pages chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower

Similar Documents

Network Security And Ethical Hacking Essay

5261 words - 22 pages Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages Ethical Hacking and Network Defense Unit 1 Assignment Kaplan University Table of Contents Scope Goals and Objectives Tasks Reporting Schedule Unanswered Questions Authorization Letter Scope Production e-commerce Web application server and Cisco network described in Figure 1.1. Located on ASA_Instructor, the e-commerce Web

Ceh Course Essay

458 words - 2 pages attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you

Ethical Issues Arising From The Intersection Of Law, Compliance & Investigations

417 words - 2 pages There are several ethical issues that arise in information security. The security is one of most issue of concern for every business organization. Ethics is a term which is used to distinguish between right or wrong things. Ethical issues in computer security includes cybercrimes, computer hacking and information warfare. In an Internet world, many banking organizations are attacked by attackers and millions of credit card details stolen every