{"id":566,"date":"2010-02-09T16:40:28","date_gmt":"2010-02-09T11:40:28","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=566"},"modified":"2024-11-09T16:50:21","modified_gmt":"2024-11-09T11:20:21","slug":"keep-out-the-bad-guys-ethical-hacking","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/","title":{"rendered":"KEEP OUT THE BAD GUYS : ETHICAL HACKING"},"content":{"rendered":"<p>If you remember the Star Wars movies, there were two sides of the Force. The light side and the dark side. In the world of hacking, ethical hacking is considered the light side of hacking. Why?<\/p>\n<p><script type=\"text\/javascript\"><\/script>Because ethical hackers use their skills and abilities for a constructive matter. Their intention is to offer adequate protection to their clients and assure them that they will be safe from hacker attacks. But it isn&#8217;t easy to become a certified ethical hacker. You need to gain some reputation along with work experience in security field.<\/p>\n<p><strong>What Is Ethical Hacking?<\/strong><\/p>\n<p>They dedicate their skills to serve their clients. Instead of spending long nights inside obscure rooms filled with computers looking for some victim, they work inside corporations, finding ways to protect the networks and computer systems.<\/p>\n<p><strong>Who Does This?<\/strong><\/p>\n<p>A hacker is a person who finds enjoyment in increasing the capacity of any device. When the personal computers appeared, hackers turned their attention to them and a new underground was created. Unfortunately, bad elements within the community and criminal organizations have given a bad reputation to this group. Among the public opinion the media is widely responsible for reporting crackers as hackers. Their lack of knowledge on means adopted by hackers and crackers has brought a bad name to hackers as well.<\/p>\n<p>Nowadays three type of hackers can be found: white, grey and black. White hackers are those who use their knowledge for selling their services to clients who want to protect their networks. Black hackers (also known as crackers) are the ones who attack those networks and try to make some money out of it.<\/p>\n<p>Grey hackers are more ambiguous. They don&#8217;t do it for the money; they do it for the rush. They want to show the world and their hacker friends how good they are.<\/p>\n<p>So, were does ethical hackers fall? Well, they are inside the white hackers group. But being a white hacker doesn&#8217;t transform you into an ethical hacker. There are some things that you need to do first.<\/p>\n<p><strong>What Are The Requirements For Ethical Hacking?<\/strong><\/p>\n<p>The first requirement is to be trustworthy. And for that, you will need to make a name. How? You need to start from the beginning: down. The first step is academic. Most of ethical hackers have written papers on this matter and published through an academic institution. This is an excellent method to show the world how preoccupied you are for computer security and that you have a desire to protect people from the dangers of the internet.<\/p>\n<p>Source:\u00a0<a href=\"http:\/\/www.hackingalert.com\/\">www.hackingalert.com<\/a><\/p>\n<p>Compiled by: <a href=\"http:\/\/www.ivyproschool.com\">www.ivyproschool.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you remember the Star Wars movies, there were two sides of the Force. The light side and the dark side. In the world of hacking, ethical hacking is considered the light side of hacking. Why? Because ethical hackers use their skills and abilities for a constructive matter. Their intention is to offer adequate protection to their clients and assure them that they will be safe from hacker attacks. But it isn&#8217;t easy to become a certified ethical hacker. You need to gain some reputation along with work experience in security field. What Is Ethical Hacking? They dedicate their skills to serve their clients. Instead of spending long nights inside obscure rooms filled with computers looking for some victim, they work inside corporations, finding ways to protect the networks and computer systems. Who Does This? A hacker is a person who finds enjoyment in increasing the capacity of any device. When the personal computers appeared, hackers turned their attention to them and a new underground was created. Unfortunately, bad elements within the community and criminal organizations have given a bad reputation to this group. Among the public opinion the media is widely responsible for reporting crackers as hackers. Their lack [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-566","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ethical Hacking: Protecting Against Cyber Threats<\/title>\n<meta name=\"description\" content=\"Learn about ethical hacking, the skills needed, and how white-hat hackers protect organizations from malicious attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical Hacking: Protecting Against Cyber Threats\" \/>\n<meta property=\"og:description\" content=\"Learn about ethical hacking, the skills needed, and how white-hat hackers protect organizations from malicious attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2010-02-09T11:40:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-09T11:20:21+00:00\" \/>\n<meta name=\"author\" content=\"Spam Prats\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spam Prats\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/\"},\"author\":{\"name\":\"Spam Prats\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"headline\":\"KEEP OUT THE BAD GUYS : ETHICAL HACKING\",\"datePublished\":\"2010-02-09T11:40:28+00:00\",\"dateModified\":\"2024-11-09T11:20:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/\"},\"wordCount\":444,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/\",\"name\":\"Ethical Hacking: Protecting Against Cyber Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2010-02-09T11:40:28+00:00\",\"dateModified\":\"2024-11-09T11:20:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"description\":\"Learn about ethical hacking, the skills needed, and how white-hat hackers protect organizations from malicious attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/keep-out-the-bad-guys-ethical-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KEEP OUT THE BAD GUYS : ETHICAL HACKING\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\",\"name\":\"Spam Prats\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"caption\":\"Spam Prats\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/admin-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethical Hacking: Protecting Against Cyber Threats","description":"Learn about ethical hacking, the skills needed, and how white-hat hackers protect organizations from malicious attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Ethical Hacking: Protecting Against Cyber Threats","og_description":"Learn about ethical hacking, the skills needed, and how white-hat hackers protect organizations from malicious attacks.","og_url":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2010-02-09T11:40:28+00:00","article_modified_time":"2024-11-09T11:20:21+00:00","author":"Spam Prats","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spam Prats","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/"},"author":{"name":"Spam Prats","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"headline":"KEEP OUT THE BAD GUYS : ETHICAL HACKING","datePublished":"2010-02-09T11:40:28+00:00","dateModified":"2024-11-09T11:20:21+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/"},"wordCount":444,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/","url":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/","name":"Ethical Hacking: Protecting Against Cyber Threats","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2010-02-09T11:40:28+00:00","dateModified":"2024-11-09T11:20:21+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"description":"Learn about ethical hacking, the skills needed, and how white-hat hackers protect organizations from malicious attacks.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/keep-out-the-bad-guys-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"KEEP OUT THE BAD GUYS : ETHICAL HACKING"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498","name":"Spam Prats","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","caption":"Spam Prats"},"url":"https:\/\/ivyproschool.com\/blog\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"predecessor-version":[{"id":12499,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/566\/revisions\/12499"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}