FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Someone who is hired by a company especially to test out the security of an organization’s information systems
A
Black Hat Hacker
B
White Hat Hacker
C
Worm
D
Spyware
Explanation: 

Detailed explanation-1: -Organizations call on ethical hackers to uncover potential security vulnerabilities that malicious hackers could exploit. The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure.

Detailed explanation-2: -Kevin Mitnick. Formerly known as the most wanted cybercriminal in America, Mitnick was arrested in 1995 and served five years in jail for his hacking. After that brush with the law, he became a white hat hacker and now runs a security consulting firm.

Detailed explanation-3: -White hat hackers probe cybersecurity weaknesses to help organizations develop stronger security; black hat hackers are motivated by malicious intent; and Gray hat hackers operate in the nebulous area in between-they’re not malicious, but they’re not always ethical either.

Detailed explanation-4: -Companies hire White Hats to stress test their information systems. They run deep scans of networks for malware, attempt to hack information systems using methods Black Hats would use, and even try to fool staff into clicking on links that lead to malware infestations.

Detailed explanation-5: -White hat hackers – sometimes also called “ethical hackers” or “good hackers” – are the antithesis of black hats. They exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.

There is 1 question to complete.