Ethical hacking (initial idea two)

With the internet's growth, almost everything is done digitally, such as commercial transactions and banking. Hence, security has become a major concern for businesses, governments, and even individuals. It is right that the internet has brought many benefits to companies (c c, 2001). However, it made them vulnerable to cyberattacks. To be a step ahead of hackers, companies can hire a professional hacker called an ethical hacker. 

 

Hacking is obtaining information from a system, targeting the computer network's weaknesses to break into without the owner's permission (Ethical Hacking In 8 Minutes | What Is Ethical Hacking? | Ethical Hacking Explanation | Simplilearn, 2020). There are three different hackers first, black hat hackers who hack illegally into a system. Second, white-hat hackers, also known as ethical hackers. White hat hacker exploits the vulnerability in a system with permission to protect the organisation. And finally, the grey hat hackers find the vulnerability in a system and inform the organisation; however, they do that illegally and without permission (Ethical Hacking In 8 Minutes | What Is Ethical Hacking? | Ethical Hacking Explanation | Simplilearn, 2020). 

 

To sum up, companies are advised to have a cybersecurity professional (ethical hackers ) testing the system, known as penetration test, before they run it in the market .in which will save them money and guarantee network security and customer satisfaction and privacy.

 

 

(Chaffee, 2019)

 

 

 

 

References :

  • c c, P., 2001. Ethical Hacking. [ebook] Armonk: International Business Machines Corporation, pp.769-780. Available at: <https://search-proquest-com.proxy.library.dmu.ac.uk/docview/222417938?accountid=10472> [Accessed 17 October 2020].
  • Ethical Hacking In 8 Minutes | What Is Ethical Hacking? | Ethical Hacking Explanation | Simplilearn. 2020. [video] Youtube: Simplilearn Verified.
  •   Chaffee, K., 2019. Most Hackers Aren’T Criminals. [image] Available at: <https://www.nytimes.com/2019/11/07/opinion/hackers-hacking.html> [Accessed 20 November 2020].



Comments

  1. Hi

    Good thought and selection of the topic.

    Is it possible to integrate the posted picture (in your draft essay 1) within the flow of the discussion by referring back?
    You might also want to use headings/subheading to guide users.
    Please use capital letters wisely as they may not be suitable for all types of users.

    Many thanks
    Chirag

    ReplyDelete

Post a Comment

Popular Posts