COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -White hat hacker definition White hat hackers – sometimes also called “ethical hackers” or “good hackers” – are the antithesis of black hats. They exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
Detailed explanation-2: -They break into other people’s computer and use their information for different purposes.
Detailed explanation-3: -A good hacker will be able to understand security concepts and technologies. The only way to overcome the obstructions established by the security admins is to become familiar with them. The hacker must know public key infrastructure (PKI), secure sockets layer (SSL), firewalls, intrusion detection system (IDS), etc.
Detailed explanation-4: -Bad hackers use the same tools as ethical hackers to exploit said vulnerabilities for personal gain. Ethical hackers often have the same training and skill set as bad hackers. Good hackers can choose to gain additional certification to prove their intention, such as the Certified Ethical Hacker (CEH) certification.