Ethical Vs Non Ethical Hacking

Table of Contents

The difference between Ethical hacking and Unethical hacking

Ethical hacking is the act of making sure that security frameworks and security software is able to block all the types of unethical hacking that is currently happening and future attacks that may happen. Unethical hacking is the act of unauthorized attack on data storages in order to gain access to data, this is what most people are familiar with and is what hacking commonly is referred to. Ethical hackers’ main job is to stop unethical hackers from getting access to data while unethical hackers try to find weak points that ethical hackers might have missed and gain access to the data from there. Methods that ethical hackers try to block and unethical hackers try to use are Windows hacking, Database hacking, Web hacking, and Network hacking. The 4 types of hackers are “Phreakers – Hackers who hack the telephone networks, Crackers – Hackers who remove the security wall of software by using software patches, Carders – Hackers who attack ATM or credit cards to retrieve user information, Script Kiddies – Hackers who want to attack computer systems for no purpose” (Difference Between Hacking and Ethical Hacking, edureka)(https://www.edureka.co/blog/difference-between-hacking-and-ethical-hacking/#:~:text=Ethical%20Hackers%20help%20develop%20the,who%20are%20the%20unethical%20hackers).

 

computer-keyboard-finger-hand-typing-technology-nail-1618025-pxhere.com

White hat hackers vs Black hat hackers

288357

White hat hackers are what are referred to as “morally right” hackers, who use their knowledge of attacking databases to try and prevent future attacks instead of just hacking them themselves. Black hat hackers are the opposite of white hat hackers, they use their knowledge to try and gain something for themselves by hacking a database, whether that be knowledge, learning skills, or getting money. White hat hackers develop security programs using various coding languages, firewalls and popup blockers to protect users and the owners. Black hat hackers use various techniques to try and gain access like Phishing, Botnets, and Keyloggers to try and gain something from the attack. In the end, the general consensus is that white hat hackers are good and black hat hackers are bad, with white hat hackers protecting against black hat hackers and black hat hackers attacking the data that white hat hackers protect.