Computer Science, asked by zennkimo, 7 months ago

can u pls explain briefly what is ethical hacking in your own words​

Answers

Answered by kabir645
33

Explanation:

ethical  \: hacking

  • Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. ... Ethical hackers aim to investigate the system or network for weak points that malicious hackers can exploit or destroy.
Answered by Anonymous
0

We hear about hacking on the news all the time—from Anonymous to fake news to denial of service attacks to data breaches; it seems like the bad guys are always wreaking havoc. And it’s true; the bad guys are doing all kinds of damage, from the annoying (spam) to the destructive (cyberattacks that steal personal data—or worse).

But did you know there are good guys with the same skills? These are ethical hackers. But what is ethical hacking?

Who is Ethical Hacker?

An ethical hacker (also known as a white-hat hacker) is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker (or a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.

An ethical hacker’s role is similar to that of a penetration tester, but it involves broader duties. They break into systems legally and ethically. This is the primary difference between ethical hackers and real hackers—the legality.

According to the EC-Council, the ethical hacking definition is “an individual who is usually employed with an organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a malicious hacker.”

The role of an ethical hacker is important since the bad guys will always be there, trying to find cracks, backdoors, and other secret ways to access data they shouldn’t. In fact, there’s even a professional certification for ethical

Similar questions