As internet reached to our tea table, we got familiar to the word “Hacker” that very day. Some love hackers, some hate hackers but at the end of the day we all dare a hacker.
Because for us hackers are peoples who pip in through our windows and take photographs of our personal life, either to thief our belongings, or to blackmail us and disturb our normal life.
But traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate.
Now Einstein discovered E=mc2 not to create the Nuclear bomb, its we who created them. The technology is not the villain, its entirely upon us as how we are projecting it as, a villain or a saviour.
In the same way, hacking is not a crime until and unless we are using it for criminal activities. But mostly after the case of The 414s was reported in early 1983, the word hacker is mostly used to identify persons who breaks into systems with criminal intentions.
Some hackers argue that they’re not criminals, but activists. They’re just rebellious in the way they think about technology and have a duty to highlight an organisations’ poor security.
Slowly we are understanding that if there is someone who can save us from the hackers are the hackers only and no one else.
The word “Ethical Hacking” came in front, to distinguish this computer personnels from their criminal counterparts. Terms like “White hat”, “Black hat” are also discovered to distinguish this two communities.
Big houses are hiring peoples, to test their security systems by performing hacking on their systems and sorting them out to safe-guard against the Cyber Hyenas.
Ethical hacking is a proactive form of information security and is also known as penetration testing or intrusion testing.
One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called “red teams” to hack its own computer systems. Hence sometimes Ethical hacking is also termed as “red-teaming”.