COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
There can be such a thing as a “Good” hacker.
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -White hat hacker definition White hat hackers – sometimes also called “ethical hackers” or “good hackers” – are the antithesis of black hats. They exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.

Detailed explanation-2: -They break into other people’s computer and use their information for different purposes.

Detailed explanation-3: -A good hacker will be able to understand security concepts and technologies. The only way to overcome the obstructions established by the security admins is to become familiar with them. The hacker must know public key infrastructure (PKI), secure sockets layer (SSL), firewalls, intrusion detection system (IDS), etc.

Detailed explanation-4: -Bad hackers use the same tools as ethical hackers to exploit said vulnerabilities for personal gain. Ethical hackers often have the same training and skill set as bad hackers. Good hackers can choose to gain additional certification to prove their intention, such as the Certified Ethical Hacker (CEH) certification.

There is 1 question to complete.