What constitutes ethical hacking?

 For hacking to be deemed ethical, the hacker must obey the following rules:

1.      Expressed (often written) permission to probe the network and attempt to identify potential security risks.

2.      You respect the individual's or company's privacy.

3.      You close out your work, not leaving anything open for you or someone else to exploit at a later time.

4.      You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.

The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals or cyber criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker, or CEH. This certification is provided by the International Council of E-Commerce Consultants (EC-Council). The exam itself costs about $500 to take and consists of 125 multiple-choice questions in version 8 of the test.

Comments

  1. Thanks for write this type of hacking article and lots of love

    ReplyDelete

Post a Comment

Hello,

Thank you for reading blogs and your lovely comment. We hope you like this blogs.

Have a nice day!

Again Thanks,
Rk Thakur

Popular posts from this blog

Hacker

Insecure Cryptographic Storage

How to Hack a Website: Online Example