jan 0001 by
Are you ready? Learn more about the CEH training - and certification programme here.
Latest from the blog
Hvordan gjøre en karriere innen etisk hacking: CEH-sertifisering, eksamen, kostnad, forberedelse, lønn og merREAD MORE
Hvordan beseire AZ-104-eksamenen og bli en Microsoft Certified Azure Administrator AssociateREAD MORE
Exploiting security vulnerabilities to steal data, cause network disruption or to cause other damage. Using advanced technical knowledge, these hackers will stop at nothing to reach their goal. This form of hacking is generally malicious and always illegal.
Breaking into networks and systems to demonstrate security weaknesses and vulnerabilities with the system owner’s permission. These hackers have deep knowledge of the same techniques employed by black hats, but their motives are good.
Generally involves using illegal techniques to break into networks but without malicious intent.
Because of the potential damage and disruption, illegal hacking is a serious crime. Hackers can face several years in prison - or even be extradited to stand trial in another country depending on who and what they attack.
Why are hackers defined by coloured hats? The categorisation (allegedly) stems from the observation that the good cowboys in Western movies typically wear white hats, while the villains wear black.
Also known as ‘ethical hacking’, white hat hacking is an important tool in the battle against malicious cyber criminals. The rest of this article will address what is ethical hacking.
Stay up to date on current developments in the Tech world related to Skills.