Warning: Creating default object from empty value in /nfs/c09/h03/mnt/132495/domains/blog.nfrontsecurity.com/html/wp-content/themes/headlines/functions/admin-hooks.php on line 160

Everything You Need To Know About Ethical Hacking

There are two different types of hackers – White Hat and Black Hat. Black Hat Hackers are what the society tends to focus on. This would be your LinkedIn, MySpace, Sony, and Ashley Madison type of hack. These hackers have malicious intent and violate a network for their personal gain. Most recently, the 117 million LinkedIn usernames and passwords are being sold on TheReadDeal Marketplace for 5 bitcoins (this is about $2,200 USD). This is a typical example of how a Black Hat Hacker would operate.

Bitcoibs

In contrast, a White Hat Hacker is also known as a Certified Ethical Hacker (CEH). He or she has passed an exam to earn the title of a Certified Ethical Hacker. They are contracted through a company to complete a penetration test and find any security vulnerabilities in the network. Furthermore, an ethical hacker may impersonate an employee or vendor representative to gain physical access to the company’s location. This is all completed ethically and legally. At the end of the penetration test, all information is reported back to the company on how they can improve.

[Click here to watch RedTeam Security try and break into a US Power Grid.]

The major difference between Black and White Hat Hackers is that White Hat Hackers are legally performing a penetration test to help better a company. While Black Hat Hackers are illegally hacking into a network for their personal gain.

Very few things in life are clear black and white occurrences. In the most recent years, Gray Hat Hackers have made a new category. Gray Hat Hackers fall in the middle of Black and White Hat Hackers. They do not work for their own personal gain; however, they may have a few illegal and unethical tactics while penetrating a network.

For more information, read the infographic below for everything you need to know about ethical hacking:

everything-you-need-to-know-about-ethical-hacking

 

Twitter Digg Delicious Stumbleupon Technorati Facebook Email

Comments are closed.