Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What is Ethical Hacking?

Tricia Christensen
Tricia Christensen
Tricia Christensen
Tricia Christensen

Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. White hats can work in a variety of ways. Many companies utilize ethical hacking services from consultants or full-time employees to keep their systems and information as secure as possible.

The work of ethical hacking is still considered hacking because it uses knowledge of computer systems in an attempt to in some way penetrate them or crash them. This work is ethical because it is performed to increase the safety of the computer systems. It’s reasoned that if a white hat can somehow break the security protocols of a system, so can a black hat. Thus, the goal of ethical hacking is to determine how to break in or create mischief with the present programs running, but only at the request of the company that owns the system and specifically to prevent others from attacking it.

Ethical hackers run penetration tests on their organizations' networks to determine threat protection levels.
Ethical hackers run penetration tests on their organizations' networks to determine threat protection levels.

People enter the field of ethical hacking in a variety of ways. Many people are very computer savvy and many, but not all, have an educational background in computer science. In some instances, the white hat has gained his or her experience by first being a black hat.

If black hat hacking was at a sufficiently criminal level, the black hat turned white hat may have served jail time before resuming a career in a more productive and positive way as an ethical hacker. The computer world is peopled with former black hats, who now hold ethical hacking jobs. Conversely, some white hats, such as Steve Wozniak, never committed any illegal acts, but simply possess the know-how and skills to analyze problems with any computer system.

People enter the field of ethical hacking in a variety of ways.
People enter the field of ethical hacking in a variety of ways.

With increasing use of the Internet and concerns about its security, especially when it comes to things like consumer information or private medical details, there is considerable need for computer experts to work in ethical hacking. Even sites owned by organizations like the US government have been hacked in the past, and concern about information theft remains incredibly high. Designing impenetrable systems or identifying the current weaknesses of a system are vital parts of keeping the Internet safe and information private, and even with the present legion of ethical hackers that perform this work, there is still more work to do.

Ethical hackers might have extensive experience breaking into different networks.
Ethical hackers might have extensive experience breaking into different networks.

Those with interest in the field of ethical hacking often acquire a lot of their skills on their own, and many have particular talent with and affinity for computers. Some knowledge can also be acquired through formal education in computer programming. This work requires creativity, and the ethical hacker must be able to think outside of the box, coming up with as many possible ways as he or she can derive, a system might be encroached upon by black hats.

Tricia Christensen
Tricia Christensen

Tricia has a Literature degree from Sonoma State University and has been a frequent EasyTechJunkie contributor for many years. She is especially passionate about reading and writing, although her other interests include medicine, art, film, history, politics, ethics, and religion. Tricia lives in Northern California and is currently working on her first novel.

Learn more...
Tricia Christensen
Tricia Christensen

Tricia has a Literature degree from Sonoma State University and has been a frequent EasyTechJunkie contributor for many years. She is especially passionate about reading and writing, although her other interests include medicine, art, film, history, politics, ethics, and religion. Tricia lives in Northern California and is currently working on her first novel.

Learn more...

Discussion Comments

anon926026

Sorry, correction - I meant to quote Qohe 1 et, not ShadowGenius.

anon926025

ShadowGenius is right, there are those that want the deliberate destruction of information stopped. I don't buy into the..."we need bad guys to keep the good guys in business" which is complete BS. My opinion, what we need is to advance our space travels to propel all these criminals into outer darkness where they belong. See ya! Don't wanna be ya!

anon297822

I think that there is a third kind of hacker: one who hacks for no reason at all other than for entertainment.

anon265491

@ShadowGenius: Well, let's just see here. You say police and laws exist because criminals do. OK, granted. But would you also say criminals exist because the police and the laws do? No? Well, your logic only goes one way then. The supposed symbiosis isn't there.

arod2b42

Doesn't ethical hacking provide incentive to learn how to become a hacker, which often leads people to hack for personal unethical reasons?

BioNerd

Hacking requires an intimate knowledge of multiple computer codes and an innovative mathematical capacity to recognize various patterns in encryption and complicated codes. It is sort of like a mental exercise for smart people who have been trained extensively in computer science. Their need to prove their own intelligence and laugh at people who are not so enlightened extends to the point where they are willing to cause damage to other people's property via creating viruses and accessing private data. Luckily these people are relatively few.

Qohe1et

@ShadowGenius

I think this is true to some extent, but we should remember that there are people who are genuinely working hard for ethical reasons and want to see these things end.

ShadowGenius

Ethical hackers and non-ethical hackers are keeping each other in business. There is a symbiotic existence in the relationship between those who design viruses and those who design anti-virus software. If there were no criminals there would be no need for a police force or for laws, and heroes would be non-existent. Think of how boring the world would be without problems!

Post your comments
Login:
Forgot password?
Register:
    • Ethical hackers run penetration tests on their organizations' networks to determine threat protection levels.
      By: Eimantas Buzas
      Ethical hackers run penetration tests on their organizations' networks to determine threat protection levels.
    • People enter the field of ethical hacking in a variety of ways.
      By: Yeko Photo Studio
      People enter the field of ethical hacking in a variety of ways.
    • Ethical hackers might have extensive experience breaking into different networks.
      By: Subbotina Anna
      Ethical hackers might have extensive experience breaking into different networks.