A hacker can make life miserable for a person, mortally wound the reputation of a company or become an enemy for an entire country. But not all seek to do harm. We invite you to enter the world of a hacker without bad intentions.
As if it were a science fiction movie in which the good fight against evil in a war of codes and algorithms , in real life there are hackers who seek to counter the actions of cyber criminals.
The style of the child superheroes , ethical hackers are trying to protect the world, in this case virtual, from the evil of the digital age.
"(My main goal as an ethical hacker) is to help organizations improve their security technology to reduce the risk that a malicious hacker could compromise their systems. That would have serious consequences and could affect many people, "said Adam Hiscocks told the BBC.
Hiscocks finished his studies Ethical Hacking (Ethical Hacking) at the University of Abertay Dundee, Scotland, and works as a computer security expert for the company Context Information Security.
Rorie Hood is a young man who is studying to become an ethical hacker. We asked him why.
"As a hacker want to understand how things work , everything, even the hardware. know how to exploit a system is really a result of what you can learn everything, understand everything, and realize that the software is doing something he should not . By providing a solution to a vulnerability , it helps not only to software but to the community that developed it, keeping it and using it daily. "
Differences
When we talk of a hacker, usually comes to mind a computer genius that caused harm to someone or some institution to benefit financially or for a cause.
The list of cyber crime is becoming increasingly longer: identity theft, website hijacking, attacks on a company's servers, theft of confidential information from a company or government, theft of passwords and details bank customers, a virus infection of the computer system of an organism ...
"The general public often misunderstands the term. The difference between a malicious hacker and an ethical hacker is that the latter has all the authorization of the owner of a system to carry out tests. In essence , an ethical hacker is operating under of law, "he told BBC Natalie Coull, a professor at the University of Abertay Dundee in the UK.
And what they do exactly?
"The ethical hacking is a recognized industry term that simply means to test the security of a system (network, website, software and all the infrastructure of an organization) to have the mind set on a malicious hacker," explained teacher.
Stereotypes
The image of the hacker who is locked in a dark room, sitting at the computer and not talk to anyone is just a stereotype that was anchored to the past, experts say.
"Today the ethical hacking is as much a social element and computers safely. In a social environment, hackers share ideas, discuss current research and enjoy a friendly beer," said Hood.
When aspiring hacker would ask, ' what has been the main difficulty faced in the course?
"The stereotype that hacking is wrong. Powered by LulzSec and groups like Anonymous, hackers face serious prejudice in modern society. While not denying that some people hack for profit, for political idealism (hacktivists) or malicious reasons, there is a much larger community that just loves technology and wants to improve it for everyone. "
"That means making it safer. That can not be achieved without first understanding why things are vulnerable . Science has given us a nuclear power reactor. However, we also gave an atomic bomb. Good things can be used for purposes wrong, "said the student.
Opportunities
Thousands of companies, banks, governments, secret services are recruiting ethical hackers to avoid being victims of a cyber attack.
According to Coull, many banks are required that their services are tested for ethical hackers to ensure that their payment processing mechanisms with credit cards comply with safety standards.
"Small companies may use them for short periods while larger firms could hire them full time," said the teacher.
Hiscocks said the high-profile cyber attacks have been reported in the last two years have increased the demand for ethical hackers.
"(In my work) I mainly order to prove how safe are web applications , which means I have to spend much of their time trying to hack several websites that are operated by our customers, "said the expert.
"I do not think anything can beat a computer hacking law, especially when I do it with a team of very talented, experienced and passionate."
Temptations
With all the tools, knowledge and skills that people like Hiscocks have developed in their career, one question is inevitable: how do you handle the temptation of becoming a malicious hacker?
"I've never really felt tempted to become a hacker bad and attack systems of people with the intention of causing damage or economic benefit. There are moments when I realize things while browsing web sites and I can be tempted to take a look. However, it would be illegal and would jeopardize my career. So tell me not to do anything, "he said.
And from the educational perspective what are the guarantees that a sheep will not go down the wrong path?
"You do not need a college degree to be an attacker. Our students chose this course because they want to learn the skills necessary to gain employment in the area of computer security . Before entering the course, students also undergo an interview and a criminal background check, "said Coull.
Students in Ethical Hacking taught law related to computer security so they know how to operate without infringing the law.
Lse Hiscocks the first college graduate who started the career of "hacking" ethical (Photo: BBC)
As a hacker I understand how things work, everything down to the hardware. Know how to exploit a system is really a result of what you can learn everything, understand everything, and realize that the software is doing something he should not. By providing a solution to a vulnerability, not only to software support, but the community that developed it, which keeps and uses it daily "
"The difference between a malicious hacker and an ethical hacker is that the latter has all the authorization of the owner of a system to carry out tests. In essence, an ethical hacker is operating under the law"
"I do not think anything can beat a computer hacking law, especially when I do it with a team of talented, experienced and passionate"
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2011
(360)
-
▼
October
(59)
- Recycled paper turned into art
- Private jet is controlled by the iPad
- Urban Concept Audi, audi car future
- TDK Headphones IE-500
- Navigating through the secrets of the scientific r...
- Electronic waste from rich countries, a pollution ...
- Add salt and pepper to the meal with two batteries
- Slingshot to make funny pictures
- The first supermarket where you can buy virtually
- Scooter made from bamboo and electric motor
- Noah, shelter to survive a tsunami
- Brazil, Germany and the U.S., the ones who have as...
- Facebook chooses the cold northern Sweden
- The kitchen of the future will be like a laptop
- LEGO Digital Camera
- The case that turns the iPhone into a projector
- Ball with 36 cameras for 360 degree panoramic photos
- Macquariums, aquarium recycling a CRT screen iMac
- IPhone Speakers licensed Angry Birds
- Enter the world of a "hacker" ethic
- Google Maps API is no longer free
- The Samsung Nexus Galaxy
- Apple's flagship product in 2012 could be a TV
- The electric car fails in its attempt to popularize
- A robot man finally conquers the Rubik's Cube
- European experts are committed to train children a...
- Queues until midnight for the launch in Spain of t...
- The new members will have iPad instead of laptop
- HP decides to maintain its personal computer division
- Mars formed more quickly than usual in nature planets
- The space telescope "Hubble" discovered the fourth...
- Eris, the 'planet of discord' that demoted Pluto i...
- Sony is the Sony-Ericsson all by 1,050 million
- Spanish consumers are the world's busiest social n...
- Linkedin launches a service to 'hunt' talents but ...
- Applications for tablet aimed at the smaller
- Nokia has Lumia 800, the first "real Windows Phone"
- IOS beats Android application download
- Amazon's earnings fall 73% in third quarter
- Three years in prison for insulting Islam Egyptian...
- An experiment shows how the quantum levitation
- Tools to reduce size and weight without resorting ...
- Android phones offer applications similar to Siri,...
- Microsoft is done with half of the patents of Andr...
- Netflix prepares for landing in Europe next year
- Death of John McCarthy, considered the father of A...
- U.S. asks China explanations by blocking sites fro...
- Successfully deployed the first two satellites of ...
- Apple vs Samsung: a war that lasts for months and ...
- Find dinosaur DNA is somewhat "unlikely", accordin...
- Google and Microsoft, among candidates to buy Yahoo
- Harvard graduate, magician and entrepreneur most p...
- Ford E-Bike, bike with Formula 1 technology
- 146,000 euros it costs to travel in space
- Facebook: "In the future, all brands will be social"
- The biography of Steve Jobs arrives in Japan with ...
- Steve Jobs came to behave more miserable with thei...
- How to find out how much Facebook knows about you
- The Congress will spend 600 million euros and 350 ...
-
▼
October
(59)
0 comments:
Post a Comment