Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

ETHICAL OF HACKING

Written by Matthew Sebastian

Ethical hacking The Rules


Ethical hackers or white hackers are also hacking Ethical hackers or white hackers must follow
the system. However, they are legally able to hack certain guidelines in order to perform hacking
the system in a specific context. They use their legally. The rules of ethical hacking:
skills to hack into the company's network and Report any security attacks and weaknesses
learn about the system's weakness. Then, they will found in the system or network
explain the weaknesses and give suggestions on Keep their discoveries confidential. As their
what they need to improve in their security purpose is to secure the system or network,
system. ethical hackers should agree to and respect
their non-disclosure agreement
What do they do? Erase all traces of the hack after checking the

Ethical hackers or white hackers utilize their system. It will prevent from any malicious

knowledge and education to think like a hacker hackers

and their willingness to use their skills for good


to help organizations. Conclusion
They check the system's weaknesses such as: There are many cyber security think that
Injection attacks ethical hackers can help the company to
-
Changes in security settings increase their security. They are perhaps the
Exposure of sensitive data best cyber security and there is a high demand
Breach in authentication protocols across industries for system protection.
Components used in the system or network
that may be used as access points Government agencies also recruit many
hackers for cyber security because they want
to see what a cyber attacker can do. For
instance, how the attacker may access the
information or what they want to do with it. In
the end, they will provide a solution by giving a
variety software or options to help the
organization or the company increase their
security from the hacker.

References:
1. Simplilearn. (2022). What is Ethical Hacking? A Comprehensive Guide. Retrieved on 12 March 2022.
Available on https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-ethical-hacking
2. WGU. (2019). Ethical Hacking and How It Fits with Cybersecurity. Retrieved on 12 March 2022.
Available on https://www.wgu.edu/blog/ethical-hacking-how-fits-with-cybersecurity

You might also like