Really Ethical H@cking (REH)
REH starts with a really good definition about what it is:
Ethical h@cking involves replicating the tactics, strategies and actions (such as the use of tools, scripts, software and operating systems) used by attackers. The cyber attackers being replicated, are the ones setting out to do harm, they aim to interfere with the victims digital assets, often with much wider consequences. The Ethical h@cker is ultimately seeking to curtail the criminal activity of h@cking.
Ranjan Raja, a renowned Ethical H@cker who has achieved Facebook Whitehat commendations for his cutting edge techniques commented today, that Ethical h@cking remains ethical as long as the data on the web/website remains untampered and if it is merely used to log in to a web/website platform. I would add that as long as the privacy of those whose confidential data also weren't breached, read or distributed by the Ethical H@cker.
How does Ethical H@cking differ from Cyber Security?
• Cyber Security is the theory of the methodologies and tactics used by hackers
involved in saving precious and sensitive data. Software applications, computer
networks and systems are all vulnerable to cyber attacker's efforts.
How to cyber attackers work...here are a few methods...
• Disrupting the normal functions organisations and how they operate
• Encrypting data and extorting money through ransomware attacks
• Fiddling with systems and data
• Exploiting resources
• Accessing systems and sensitive information without being authorised to do so

0 Comments