Ø
The main reason why hackers hack is because they
can hack. Hacking is a casual hobby for some hackers-they just hack to see what
they can hack and what they can’t hack, usually by testing their own systems.
Many hackers are the guys who get kicked out of corporate and government IT and
security organizations. They try to bring down the status of the organization
by attacking or stealing information.
Ø
The knowledge that malicious hacker’s gain and
the ego that comes with that knowledge is like an addition. Some hackers want
to make your life miserable, and others simply want to be famous. Some common
motives of malicious hackers are revenge, curiosity, boredom, challenge, theft
for financial gain, blackmail, extortion, and corporate work pressure.
Ø
Many hackers say they do not hack to harm or
profit through their bad activities, which helps them justify their work. They
often do not look for money full of pocket. Just proving a point is often a
good enough reward for them.
Prevention
from Hackers:
Ø
What can be done to prevent hackers from finding
new holes in software and exploiting them?
Ø
Information security research teams’ exist-to
try to find these holes and notify vendors before they are exploited. There is
a beneficial competitions occurring between the hackers securing systems and
the hackers securing systems and the hackers breaking into those systems. This
competition provides us with better and stronger security, as well as more
complex and sophisticated attack techniques.
Ø
Defending hackers create detentions systems to
track attacking hackers, while the attacking hackers develop by passing
techniques, which are eventually resulted in bigger and better detecting and
tracking systems. The net result of this interaction is positive, as it produces
smarter people, improved security, more stable software, inventive
problem-solving techniques, and even a new economy.
Ø
Now when you need protection from hackers, whom
you want to call, “The Ethical Hackers”. An ethical hacker possesses the
skills, mindset, and tools of a hacker but is also trustworthy. Ethical hackers
perform the hacks as security tests computer system.
Ø
Ethical hacking-also known as penetration
testing or white-hat hacking-involves the same tools, tricks and techniques
that hackers use, but with one major differences:
Ø
Ethical hacking is legal.
Ø
Ethical hacking is performed with the target’s
permission. The internet of ethical hacking is to discover vulnerabilities from
hacker’s view point so systems can be better secured. Ethical hacking is part
of an overall information risk management program that allows for ongoing
security improvements. Ethical hacking can also ensure that vendor’s claim
about the security of their products are legitimate.
Ø
As hackers expand their knowledge, so should you
must think like them to protect your systems from them. You, as the ethical
hacker, must know activities hackers carry out and how to stop their efforts.
You should know what to look for and how to use that information to the wart
hacker’s efforts.
Ø
You don’t have to protect your systems from
everything. You can’t.
Ø
The only protection against everything is to
unplug your computer systems and lock them away so no one can touch them-not
even you.
Ø
That’s not the best approach to information
security. What’s important is to protect your systems from known
vulnerabilities and common hacker attacks
Ø
It’s impossible to overcome all possible
vulnerabilities of your systems. You can’t plan for all possible
attacks-especially the ones that are currently unknown which are called zero
day exploits. These are the attacks which are not known to the world. However
in ethical hacking, the more combinations you try –the more you test whole
systems instead of individual unit –the better your chances of discovering
vulnerabilities

No comments:
Post a Comment