3. What do you understand by ‘ethical hacking’? What are its applications?
एथिकल हैकिंग से आप क्या समझते हैं? इसके अनुप्रयोग क्या हैं?
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems
Applications of Ethical Hacking:
- Setting up protective shield against destructive hacking efforts by state/non-state actors. For national security , sometimes they try to break the securities of other nations , also known as grey hat hacking.
- Counter hacking operations (as ‘sword’)
- Taking steps to fix weaknesses in extant software frameworks.
4.Ethical hackers try and work to stop any type of data theft which can helpful for any company
- Business – though the newly born business involve some form of resistance to hacks but traditional business lacks any such trend and thus are vulnerable to hacking.
- Hotel management and related industries – these sites are hacked to stock the corporate travellers. Darkhotel is one such malware.
- Ethical hacking as career – it may be of immense opportunities with salaries from INR 9 to INR 20 lakh.
- Ethical hackers help to recover erased and deleted data which is prove to be useful.
- Trustworthiness and ethics of hackers may be a challenge
- Poor networking infrastructure and tools may pose a threat to effective working
- Lack of awareness among organisation leads to threat in maintaining data
In this context, Government of India had put in motion a National Cybersecurity Policy in 2013 which aims to create a force of 5 lakh cybersecurity professionals, besides other provisions.
However, the stated policy objectives are yet to be achieved, besides other weaknesses in India’s cybersecurity infrastructure as exposed during the recent ransomware attacks (Petya, Wannacry etc.) and cyber frauds. Concerted efforts need to be made to achieve these stated goals and strengthen our cybersecurity infrastructure.
Best answer: Dazy Rani