Really Ethical H@cking


Really Ethical H@cking  (REH)

REH starts with a really good definition about what it is:

Ethical h@cking involves replicating the tactics, strategies and actions (such as the use of tools, scripts, software and operating systems) used by attackers.  The cyber attackers being replicated, are the ones setting out to do harm, they aim to interfere with the victims digital assets, often with much wider consequences.  The Ethical h@cker is ultimately seeking to curtail the criminal activity of h@cking.

Ranjan Raja, a renowned Ethical H@cker who has achieved Facebook Whitehat commendations for his cutting edge techniques commented today, that Ethical h@cking remains ethical as long as the data on the web/website remains untampered and if it is merely used to log in to a web/website platform.  I would add that as long as the privacy of those whose confidential data also weren't breached, read or distributed by the Ethical H@cker.

How does Ethical H@cking differ from Cyber Security?

Cyber Security is the theory of the methodologies and tactics used by hackers
involved in saving precious and sensitive data.  S
oftware applications, computer
networks and systems are all vulnerable to 
cyber attacker's efforts.

How to cyber attackers work...here are a few methods...

Disrupting the normal functions organisations and how they operate

 Encrypting data and extorting money through ransomware attacks

 Fiddling with systems and data

 Exploiting resources

 Accessing systems and sensitive information without being authorised to do so


Hackers from Creative Commons (Not for Profit Image)













Post a Comment

0 Comments