123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Ethical Hacking- How To Pursue Your Career In It

Profile Picture
By Author: david raju
Total Articles: 78
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

As an individual specially if you don’t have any deeper knowledge in any technical terms did you know that when you conduct a deeply research in word hacking it divides into three different groups the white hacking black hacking and grey hacking obviously when we say hacking the person behind that is called hacker. Let’s make a comparison between those three.
First what is black hacking? These kind of action it violates the code of ethics in the computer networking world industry the black hackers can access into a network and breaks the security and do whatever they want to do, There are two different stage that the black hacker usually do the first part is what we called targeting, blacker hackers will determine the whole network structure and breaks into it to be success in doing that thing they testing all of the ports and if some of the port opens that’s the time where the black hackers intrudes the network, in order to understand in a very simple here’s an example the hose symbolize the network the hole in the hose considered as a port and lastly the faucet with runny water acts like a tester if there is ...
... a hidden hole in the hose so when you have a hose in order to check it there is a hole you will need to put it in the faucet and run the water and when you found any hole you will tampered it.
Next is the White Hacking or Ethical Hacking , if the hackers belongs into this group you have no worries at all because there only goal is to test if the security if good enough for the intruders outside the network, most of the big companies they hire a white hacker for the penetration test of their internet security but before they start the penetration test of course they need to sign a contract to a particular company to obtain legality. Take note if the white hacker conducts a penetration test to a company without any permission and contract big companies considered them as illegal hackers or also known as black hacker even though if the white hacker said “just concern for the security issues” or for the sake of good security of the company the bottom line there is there are no permission and contracts. Therefore you cannot do a penetration test just like grabbing a piece of candy in a store.
And the last one is the Grey hacker. So what is a Grey hacker? It is a combination of black and white hacker in other words Neutral, if someone ask what “they usually do?” They simply penetrate the big company anonymously and inform the network administrator that their network security is weak and if the grey hacker want’s to earn money they offer the network administrator to repair the company’s network security in a low price.

Total Views: 245Word Count: 487See All articles From Author

Add Comment

Education Articles

1. Devops: The Modern Skillset Every Tech Professional Should Master
Author: safarisprz01

2. Salesforce Marketing Cloud Training In India | Cloud
Author: Visualpath

3. How An English Medium School Shapes A Child’s Future In Today’s Global World
Author: Mount Litera Zee School

4. Mern Stack Online Training In Ameerpet | Mern Stack Ai Training
Author: Hari

5. Why Online Courses In Sap Sd Are The Best Solution For Today's Professionals
Author: ezylern

6. Sailpoint Online Course In Bangalore For Professionals
Author: Pravin

7. Sap Ai Course | Sap Ai Online Training In Hyderabad
Author: gollakalyan

8. Why Aima Is The Best Choice For A Global Advanced Management Programme
Author: Aima Courses

9. The Best Oracle Integration Cloud Online Training
Author: naveen

10. Mlops Training Course In Chennai | Mlops Training
Author: visualpath

11. International Cbse School In Nallagandla,
Author: Johnwick

12. Best Mba Dual Specialization Combinations For 2025 And Beyond
Author: IIBMS Institute

13. Top Docker Kubernetes Training In Hyderabad | Docker And Kubernetestop Docker Kubernetes Training In Hyderabad | Docker And Kubernetes
Author: krishna

14. Full Stack Web Development Course In Noida
Author: Training Basket

15. Master Advanced Pega Skills With Pega Cssa Infinity'24.2 Online Training By Pegagang
Author: PegaGang

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: