123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Ethical Hacking- How To Pursue Your Career In It

Profile Picture
By Author: david raju
Total Articles: 78
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

As an individual specially if you don’t have any deeper knowledge in any technical terms did you know that when you conduct a deeply research in word hacking it divides into three different groups the white hacking black hacking and grey hacking obviously when we say hacking the person behind that is called hacker. Let’s make a comparison between those three.
First what is black hacking? These kind of action it violates the code of ethics in the computer networking world industry the black hackers can access into a network and breaks the security and do whatever they want to do, There are two different stage that the black hacker usually do the first part is what we called targeting, blacker hackers will determine the whole network structure and breaks into it to be success in doing that thing they testing all of the ports and if some of the port opens that’s the time where the black hackers intrudes the network, in order to understand in a very simple here’s an example the hose symbolize the network the hole in the hose considered as a port and lastly the faucet with runny water acts like a tester if there is ...
... a hidden hole in the hose so when you have a hose in order to check it there is a hole you will need to put it in the faucet and run the water and when you found any hole you will tampered it.
Next is the White Hacking or Ethical Hacking , if the hackers belongs into this group you have no worries at all because there only goal is to test if the security if good enough for the intruders outside the network, most of the big companies they hire a white hacker for the penetration test of their internet security but before they start the penetration test of course they need to sign a contract to a particular company to obtain legality. Take note if the white hacker conducts a penetration test to a company without any permission and contract big companies considered them as illegal hackers or also known as black hacker even though if the white hacker said “just concern for the security issues” or for the sake of good security of the company the bottom line there is there are no permission and contracts. Therefore you cannot do a penetration test just like grabbing a piece of candy in a store.
And the last one is the Grey hacker. So what is a Grey hacker? It is a combination of black and white hacker in other words Neutral, if someone ask what “they usually do?” They simply penetrate the big company anonymously and inform the network administrator that their network security is weak and if the grey hacker want’s to earn money they offer the network administrator to repair the company’s network security in a low price.

Total Views: 331Word Count: 487See All articles From Author

Add Comment

Education Articles

1. Best Sap Ariba Training Bangalore | Sap Ariba Course
Author: krishna

2. Servicenow
Author: Hari

3. Salesforce Data Cloud Training Pune | Visualpath
Author: Visualpath

4. Sailpoint Online Training | Sailpoint Training India
Author: Visualpath

5. Devops Certification Training In Pune For Freshers & Professionals
Author: Fusionsoftwareinstitute

6. Llm Artificial Intelligence Course | Ai And Llm Course
Author: naveen

7. Nebosh Training Center – Global Certification Meets Local Expertise
Author: Gulf Academy of Safety

8. Best Engineering Colleges In Lucknow 2026 | Fees, Placements & Admission
Author: mcsgoc

9. Aima: The Smart Choice For A Future-ready Digital Marketing Course
Author: Aima Courses

10. Raj Public School A Smarter Start With The Icse Curriculum In Primary Classes
Author: Rajvedantaschool

11. Best Ib Schools In Chennai – Discover Excellence At Ela Green School
Author: Elagreen

12. How Ai Is Redefining Analyst Roles
Author: joshep

13. Youngest Chancellor In India
Author: SHUBHAM

14. Crm Online Training | Microsoft Dynamics 365 Courses
Author: krishna

15. Top Salesforce Devops Certification | Salesforce Devops Training
Author: Visualpath

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: