1Jan

Difference Between Hacking And Ethical Hacking

Ethical Hacking means you think like Hackers. First you hack systems and find the loop holes, and then you try to correct those loop holes. These type of hackers protect the cyberworld from every possible threat and fix potential future security loop holes. (Ethical) Hacker vs. Hacker Candice Markham January 3, 2013 Comments Off on (Ethical) Hacker vs. Hacker Despite being in the age of Trojans and malware, the dominant dread word today among systems security managers is hacking.

Today I will explain the difference between hacker and cracker. There are lots of articles on internet about the difference between hackers and crackers. In those articles, authors or publishers often try to correct the public misconceptions. For many years, media has erroneously associated the hacker word with a cracker. The general public now believes hacker is someone who breaks into computer systems, hacking passwords and websites and misusing information. This conception is absolutely untrue and demoralizes some of our most talented hackers.

I hope this will clear up most of your doubts and questions about hackers and crackers. It’s important to remember that ethical hackers need the ability to think like cracks. In order to effectively defend systems, they have to be prepared for attacks. A white hat hacker identify vulnerabilities and loopholes and fixes them so that that same vulnerability cannot be breached in the future. If you utilize that loophole for misdeeds or pure fun, then you are cracking or black hat hacking. Black hat hackers are often intelligent people, but they are still criminals.

Despite being in the age of Trojans and malware, the dominant dread word today among systems security managers is hacking. Thanks, in part, to Anonymous, that faceless hack-happy cyber-vigilante group that’s been vandalizing the websites of government entities, international organizations, and, even, private individuals who have earned its displeasure. To be sure, the terms hacking (the act of breaching the security of a computer) and hacker (the individual who carries out the hacking) are rather old. They go as far back as the first days of digital computing in the ‘60s, when computer programming—and its subculture, computer hacking—was almost entirely confined to the academe. Back then, hacking was not a dirty word at all. It was actually a means, legal and sanctioned, to test the security of a computer system and reveal its vulnerabilities, so they could be plugged.

The difference between hacking and exploiting

The dirty word then (and now, but only in the computer-programming community) was cracking, used by the legitimate hackers (the so-called “white” hackers) to mean illegal or illegitimate hacking, which is gaining access to a computer system without the express authorization of the computer owner. Illegal hacking is a crime in most countries. Today, no thanks to popular media and the likes of Anonymous, the term hacking has fallen into disrepute, and in the public mind is now synonymous with cracking. Consequently, the word hacker is almost universally understood now to mean computer criminal. The practice of legitimate hacking, however, is flourishing and, as before, is well and truly on the good side of computer security, what with the present computer landscape heavily mined by virus-worm-malware creators and crackers. It even has taken on a new name—ethical hacking. Sub

The need for ethical hacking for businesses, whether multinational enterprises or SMEs, may not be mandatory, but it is direly necessary. For three months in 2011, for example, crackers managed to cause industry giant Sony, Inc. To shut down its lucrative Playstation network after valuable information, including passwords, emails, and credit card numbers, was stolen. All told, the hack cost Sony a whopping $171 million. Subtitle film bleach lebah ganteng. To help protect their computer systems, many organizations now employ a certified ethical hacker who uses the same bag of hacking tricks and methods as a cracker. His (or her) mission is to try to break into the computer systems or penetrate the network of the company with the purpose of discovering, identifying, and fixing its weaknesses.

Penetration testing is not illegal. An ethical hacker to be certified must earn a professional certification provided by the International Council of E-Commerce Consultants, also known as the EC-Council, a professional certification body for the IT industry.

To obtain the certification, an individual must pass the certification exam given by EC-Council, usually after undergoing formal training from an accredited training provider. To be sure, the formal training is not mandatory, but just one of two options; the other being self-study. The latter, however, is the more difficult path—not only because individuals taking it have to invest a lot of time and resources to study properly, but also because of the paperwork required by the testing body of self-study examinees—that many ethical hackers simply choose to enroll in a formal training program to prepare them for their certification exams.