Ethical Hacking

Dineth Shan Gimhana
3 min readMay 28, 2021

--

Ethical hacking is critical to the security of digital conversion programs and network security requirements. Every sizable digital transformation project requires at least one ethical hacker. Some large programs may have multiple ethical hackers who specialize in key aspects and various areas of the program.

Who are Ethical Hackers?

Ethical hackers are qualified technical experts in the field of security and network security. These talented professionals have the required expertise and a thorough understanding of security areas (such as authentication, authorization, accounting, and auditing functions).

They follow four major protocol concepts:

  1. Stay legal. Before accessing and performing a security assessment, obtain appropriate approvals.
  2. Define the scope. Determine the scope of the evaluation so that the work of ethical hackers remains legal and within the scope recognized by the organization.
  3. Report vulnerabilities. Notify the organization of all vulnerabilities discovered during the assessment process. Provide remedial suggestions to resolve these vulnerabilities.
  4. Respect data sensitivity. Depending on the sensitivity of the data, in addition to other terms and conditions required by the assessed organization, ethical hackers may also have to agree to a confidentiality agreement.

The Backbone of Cybersecurity (CIA)

When diving into ethical hacking, the first step is to look at the CIA triad, which is a well-known model for the development of cybersecurity. These security concepts guide network security strategies, but they are not the only concepts.
Confidentiality, integrity, and availability (also known as the CIA triad) is a model designed to guide the organization’s strategy and information security. The goal of the CIA Integrity Triad is to ensure that information is stored accurately and consistently before making authorized changes. Since the organization is responsible for the type of information that is generated, processed, and stored, the information must be kept confidential.

  • Confidentiality
     The system ensures that only the correct, authorized users/systems/resources can view, access, change, or otherwise use the data.
  • Integrity
     The ability of the system to ensure the accuracy of the system and information.
  • Availability
     The system ensures that systems, information, and services are available most of the time.

Machine Learning in Cyber-Security

Machine learning has become an important technology for network security. Machine learning uses pattern detection, real-time cybercrime mapping, and comprehensive penetration testing to preemptively eliminate cyber threats and enhance the security infrastructure. Machine learning is a subset of artificial intelligence that uses previous data sets and algorithms generated through statistical analysis to make assumptions about the behavior of computers.

These are just some of the benefits of machine learning to provide network security for businesses and consumers.
• Comprehensive automated system scanning to find data leaks, malware,..
• Protect endpoints through quick fixes
• Analyze large amounts of data quickly
• Can be adjusted without expert input

Common Security Concerns in Computer Systems

1. Computer virus

Computer viruses are software designed to spread from one computer to another.As we all know, viruses will send spam, disable security settings, destroy and steal data in the computer (including personal information such as passwords), and even delete all content on the hard drive.

2. Rogue security software

Rogue security software is a type of malicious software that can make users mistakenly believe that a computer virus is installed on their computer or that their security measures are not up to date. Then, they provide functions to install or update user security settings. They either require you to download a program to remove the suspicious virus, or they pay for the tool. Both situations will cause actual malware to be installed on your computer.

3.DOS and DDOS attack

DoS attacks are performed by flooding the website with data packets through a machine and its Internet connection, so legitimate users cannot access the content of the flooded website. Fortunately, you can no longer really overload another server or PC. In the past few years, the flaws of the agreement have not been so common.

And many more likes Trojan horse, Adware and spyware, Computer worm, Phishing, Rootkit, SQL Injection attack, MIM attacks are the type of common security concerns in computor systems.

--

--

Dineth Shan Gimhana

Software Engineering Undergraduate | University of Kelaniya