Ethical Hacking

What is ethical hacking?

Type of Hackers

The most common network security threats

  • Computer virus
  • Rogue security software
  • Trojan horse
  • Adware and spyware
  • Computer worm
  • DOS and DDOS attack
  • Phishing
  • Rootkit
  • SQL injection attack
  • MIM attacks

Benefits of Ethical Hacking

  • Discovering vulnerabilities from an attacker’s POV so that weak points can be fixed.
  • Implementing a secure network that prevents security breaches.
  • Defending national security by protecting data from terrorists.
  • Gaining the trust of customers and investors by ensuring the security of their products and data.
  • Helping protect networks with real-world assessments.

What are the key concepts of ethical hacking?

  1. Stay legal. Obtain proper approval before accessing and performing a security assessment.
  2. Define the scope. Determine the scope of the assessment so that the ethical hacker’s work remains legal and within the organization’s approved boundaries.
  3. Report vulnerabilities. Notify the organization of all vulnerabilities discovered during the assessment. Provide remediation advice for resolving these vulnerabilities.
  4. Respect data sensitivity. Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement, in addition to other terms and conditions required by the assessed organization.

Skills Required to Become an Ethical Hacker

  • Knowledge of programming — It is required for security professionals working in the field of application security and Software Development Life Cycle (SDLC).
  • Scripting knowledge — This is required for professionals dealing with network-based attacks and host-based attacks.
  • Networking skills — This skill is important because threats mostly originate from networks. You should know about all of the devices present in the network, how they are connected, and how to identify if they are compromised.
  • Understanding of databases — Attacks are mostly targeted at databases. Knowledge of database management systems such as SQL will help you to effectively inspect operations carried out in databases.
  • Knowledge of multiple platforms like Windows, Linux, Unix, etc.
  • The ability to work with different hacking tools available in the market.
  • Knowledge of search engines and servers.

Limitations of ethical hacking

  • Limited scope. Ethical hackers cannot progress beyond a defined scope to make an attack successful. However, it’s not unreasonable to discuss out of scope attack potential with the organization.
  • Resource constraints. Malicious hackers don’t have time constraints that ethical hackers often face. Computing power and budget are additional constraints of ethical hackers.
  • Restricted methods. Some organizations ask experts to avoid test cases that lead the servers to crash (e.g., Denial of Service (DoS) attacks).

CIA Triad

Confidentiality, integrity, availability

  • Confidentiality is roughly equivalent to Confidentiality measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.
  • Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).
  • Availability means information should be consistently and readily accessible for authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information.

Machine Learning in Cybersecurity

--

--

Software engineering undergraduate, University of Kelaniya Sri Lanka

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Neminda Prabhashwara

Software engineering undergraduate, University of Kelaniya Sri Lanka