Introduction To Ethical Hacking Course
INTRODUCTION TO ETHICAL HACKING COURSE
Lesson one (1): Definition of Hacking, it’s types and their meanings.
What is Hacking?
The Term “Hacking” in information security refers to exploiting the vulnerabilities in a system, compromising the security to gain unauthorized access, command and control over the system resources. The purpose of hacking may include modification of system resources, disruption of features, and services to achieve certain goals.
Who is a Hacker?
Hacker is the one who is smart enough to steal enough information such as Business data, personal data, financial information, credit card information, username & password, etc from a system that he is unauthorized. In other words, A hacker is a person who finds and exploit the vulnerabilities in a computer systems or networks to gain access. Their intention can be either to do illegal things for fun or they may be paid off to perform the hack.
Types of Hackers
There are various types of hackers. The three (3) major ones will be discussed in this lesson. They are:
Black-Hat Hackers: This type of hacker is the one people refer to as evil. They gain unauthorized access into computer systems or networks illegally to perform malicious act either to steal money or to achieve their own illegal goals.
White-Hat Hackers: These are the good guys. They are also called Ethical Hackers or Penetration Tester. They are as skilled as the Black-Hat Hackers. They use the same skills and techniques as the Black-Hat to hack systems, they do this with permission in order to test the security of the system. They focus on securing and protecting the IT system.
Grey-Hat Hackers: They are neither the good guys nor the bad guys. They are hybrids between Black-Hat and White-Hat Hackers. They hack into any systems even if they don’t have permission to test the security of the system but they will never steal or damage the system. They sometimes act legally and sometimes they do not.