Ethical Hacking

on Thursday, 18 July 2013

Overview


Ethical hacking is an ethical hacking activities in an internet network. The hacking activity is increasing every year due to the high level of security of a network system. At this time discussing topics about hackers certification or often called Certified Ethical Hacking (CEH). CEH is an activity undertaken by a hacker with the permission and consent of the owner. The goal is to increase the security level of a system .


Hackers are grouped based on their activities. There is a group of ethical hackers, commonly referred to as white hat hacker. Hacker type are hackers who use their skills to face the black hat hackers. Usually they work in security companies and called analyst security or security consultant. Whereas black hat hacker itself is kind of hacker who uses his ability to do things that are considered illegal and destructive. This type of hackers called the cracker

Hacker type next is gray hats. These type is the kind that is sometimes a black hat hacker, but can also be a white hat hacker. Lastly, there are types of hackers called suicide hackers. They are the ones who are very dangerous, because it affected 'a thing' that makes them aim to destroy, without any fear of law. There are 5 stages that the hacker to work, Reconnaissance, namely preparation stage to investigate and gather as much information. Scanning, namely the stage to perform some action before taking access. Gaining Access, the information retrieval phase to gain access. Maintaining Access, the stage to keep an access can continue to be obtained. And the last stage is Clearing Tracks, which traces the elimination phase during the hacking process takes place, so that a hacker is not detected.


In the world of security systems, hacking is not foreign to us. I think we should have that as 'IT' must know how ethical hacking security systems in the world. Should we have to include in this type ofwhite hat hackers, in addition to not harming others, this type of hacker is also held in high regard by the international hacker certification. Example in this topic is the CEH.


0 comments:

Post a Comment