Ethical Hacking

7/14/13


This is from my lecture on my second year college. This article is about Ethical Hacking.

Ethical hacking is ethical hacking a network or the Internet, in which case we will be discussing about the hacker certification, or in other words the Certified Ethical Hacker (CEH). People who have this CEH are people - people who have been in the field of security systems. To get there CEH stages as follows: Following Training → ​​Exam Preparation, Exam Code: 312-50 or ECO-350 → If you pass, then got the CEH. People who have this certification will be highly valued, because now a lot of threat - the threat of Internet crime. Methods of threat is often done in the network and internet crime is a file inclusion, sql injection, web dav ¬ major attacks to gain access to the network. Types of threats and attacks are now more sophisticated. In addition, there are a growing number of attacks, caused by a skill that must be held to be a hacker today do not need high skill - skill hackers earlier times and the number of devices that are spread makes a lot of areas that can be attacked.

Hacking
Hacking

Hackers itself consists of several types, the first is the Black Hats, they are people who have high skill and is intended to destroy or be called Cracker. The second is the White Hats, they are people who are hired to attack a security system, to see what is lacking, and then improved to make the system more secure. Third, Grey Hats, they are people - people who probably were Black Hats, White Hats but also. Lastly, Suicide Hacker, they are people - people who are very dangerous, because they are influenced by "something" that makes them aim to destroy, without fear of legal sanctions exist. The Hacker's work through the 5 stages, Recconaissance, the investigation stage for information. Scanning, that some action should be taken before taking access. Gaining Access, which took the information to gain access. Maintaining Access, namely to keep the access can continue to be obtained. Lastly, Clearing Tracks, ie remove traces - traces during the hacking process takes place so that hackers are not detected.

In the security world, of course there is always a bad guy and good guy. Similarly, in network security. Expected if we'll be a hacker, we included in the category of good guy. In addition to not harming others, it will be good hackers are highly valued when successfully create impenetrable defense system, and one way is to get a high valued hacker internationally recognized certifications, such as CEH. According to available data, salary in the U.S. ranges from $ 56,000 - $ 80,000, not a small amount, is not it? Indeed, the effort required is very hard and unyielding mental high to be a hacker who recognized its class, but it can be achieved by anyone, including us. Spirit!

Thanks for reading my article about Ethical Hacking, hope you can understand this :)

No comments:

 

Tags