What is hacking? Who is an ethical hacker?

Blog, Cyber Security|0 comments

The process of gaining unauthorized access to a computer system or connected networks,  to steal sensitive information or harm the system security infrastructure is known as Hacking.

Hacking is the practice of manipulating or gaining unauthorized access to a specified  computer system or a private network in order to extend its capabilities or alter its functionalities.

Different ways of hacking:

  1. Network Hacking is intent of harming the network system and hampers its operation, by using commands like Ping, Traceroute, Telnet, NS lookup, Netstat, etc.
  2. Computer/password Hacking is a process of gaining unauthorized access to a computer system by applying different hacking methods to steal computer ID’s and password.
  3. Website Hacking is a process of gaining unauthorized control over a web server and its associated databases, to make unethical changes or damaging a website.
  4. Ethical Hacking is a process of finding weaknesses of a specified network system for testing purpose and resolving the bugs.
  5. Email Hacking is a process of gaining unauthorized access on an Email account and using it without taking the consent of its owner.

Who is Ethical hacker?

An ethical hacker is someone who systematically attempts to penetrate a network system on behalf of its owner to find security vulnerabilities and weaknesses of computer network system. The main idea of an ethical hacker is to ensure system and network security in all types of organizations by replicating malicious hackers. Ethical hackers are also known as “white hat hackers” or Intrusion tester.

How an ethical hacker protects network system?

Ethical hackers work to test and bypass system defenses by duplicating the intent and actions of malicious hackers. The purpose of ethical hacking is to evaluate the overall security infrastructure of connected networks.

An ethical hacker employs different strategies to penetrate a network system, such as;

  • Social engineering concepts like shoulder surfing
  • Sniffing networks
  • Bypassing and cracking wireless encryption
  • Hijacking web servers and web applications

Certification requires?

The Certified Ethical Hacker (CEH), offered by the EC-Council.

This certification focuses on social engineering, enumeration, system hacking, worms, viruses and other forms of attack. This credential validates your skills or knowledge about penetration testing, cryptography, IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), honeypots, firewalls and many more.


So how you will going to protect your data and networks?

“ Just add this valuable credential on your resume and protect your world from being hacked – choose to be an Ethical Hacker“


Share this Post:

Leave a Reply