Aditi Mishra, aditi.mishra@kalingauniversity.ac.in
Assistant Professor (CS)
Kalinga University, Naya Raipur
Abstract:-
The massive growth of digital India lead to the peoples using IT as a whole. All the information are very easily available in a bot. Some use IT for information gathering, research, gaining knowledge whereas there are also someone who use it for their evil mind. To steal data from websites or database and to use it for their own fun are a very common way for stealer. They are the one known as HACKER. This paper discuss about the types of hacking, various hacking techniques and details about Ethical hackers.
Introduction:-
The term HACKING defines the activities that compromise digital devices, networks to get access information or data in unauthorized way. Hacking is not always malicious activity but it can be associated with cybercrime activity. A hacker is a person who is Master in programming language, network and is computer enthusiastic person. He always love to learn new technologies to enhance his skills and capabilities to better understand minute details of a computer system.
Hacking consist of two types: Black hat Hacking and White hat Hacking. Black hat hacking are the hacking activities that use data or information for illegal or malicious purposes. Generally we can say that black hat hackers are bad person who break the system integrity or violate system intentionally. They target to cause problem to destroy data or gain unauthorized access.
White hat is an ethical security hacker. These are the good people who exploits for some great cause. Basically White hat hackers are computer security specialist who uses their skills and knowledge for an organization to protect it from any suspicious or malicious hacking. They find loopholes in the company network or computer system of organization and try to remove or improve it.
Hacking Techniques:-
There are several hacking techniques that hackers uses for its purposes. Some commonly used hacking techniques are:
Ethical Hacker:-
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
Ethical Hacker Key Concept:-
Ethical hacker must follow following key concept:
Kalinga Plus is an initiative by Kalinga University, Raipur. The main objective of this to disseminate knowledge and guide students & working professionals.
This platform will guide pre – post university level students.
Pre University Level – IX –XII grade students when they decide streams and choose their career
Post University level – when A student joins corporate & needs to handle the workplace challenges effectively.
We are hopeful that you will find lot of knowledgeable & interesting information here.
Happy surfing!!