Ethical Hacking

Drunk Photographer on Flickr

Learn how you can use your hacking super powers for good!

When you imagine a hacker, what do they look like? You might think of someone from the movies with a cool pair of shades. Maybe you imagine someone in a balaclava typing away on their keyboard!

However, not every hacker is a bad guy. Some people have the skills and the knowledge to cracka advanced security systems, but they choose not to use it to do harm. Instead, they actually make a legal and productive career out of it!

This career path is known as “ethical hacking.” It’s ethical because the hacker doesn’t break into people’s computers without permission. Instead, the hacker looks for people who want someone to break their security.

So, what kind of person wants someone to break into their computer? Big companies with lots of sensitive and personal data on computers. If a hacker manages to get in and steal or delete the data, it would be really bad for the company.

To stop this, businesses put up lots of tough cybersecurity defenses to stop hackers from getting in. However, not all defenses are perfect, and there may be a way that a hacker can find a flaw or weakness that they can use to get in.

As such, once a company has the defenses in place, they want to know if it’s working properly or not. The best way to know if a hacker can get in or not is to…hire a hacker!

This is where ethical hacking comes into play. If a company wants to put its security to the test, they can hire people to hack into the network. If the hacker manages to get in, the hacker reports how they did it to the company. The company can then patch up the problem to prevent future attacks.

Sometimes a company doesn’t hire a hacker; instead, they post what’s called a “bug bounty.” This sounds like a WANTED poster with a cockroach on it, but it means something entirely different in the security world!

When a company posts a bug bounty, they make a public statement that they want someone to crack into its system and give the company proof of the deed. If a hacker manages to complete the challenge and show the company how they did it, the company gives the hacker a lot of money.

How much money? A LOT of money. You can see some examples if you look up Microsoft Bounty programs. Finding a flaw on the small programs will net you $15-20k, and finding a flaw in Microsoft’s most secure systems gets you a whopping $100k!

You can see, then, how people who love cracking security can make a legal job out of their skillset. If you’re interested in security yourself, be sure to consider becoming an ethical hacker yourself!

Learn More

White hat hacker

https://www.varonis.com/blog/white-hat-hacker/

Microsoft Bounty Programs

https://www.microsoft.com/en-us/msrc/bounty

What Is Ethical Hacking?

https://www.eccouncil.org/ethical-hacking/

Bug Crowd

https://www.bugcrowd.com/bug-bounty-list/

three types of hackers

https://www.designworldonline.com/what-are-the-three-types-of-hackers/

Red and white hacking

https://searchsecurity.techtarget.com/answer/What-is-red-and-white-hat-hacking

Bug Bounties and how they work

https://ostif.org/bug-bounties-what-they-are-and-why-they-work/

Skills of bug bounty

https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4

Ethical hacking for kids

https://www.amazon.com/Hacking-Kids-Bryson-Payne/dp/1718500009

Prepare kids for a career in cybersecurity

https://resources.infosecinstitute.com/how-to-get-kids-prepared-for-a-career-in-cybersecurity/

Kids learn to hack

https://www.youtube.com/watch?v=r5aZPArWyaI

Hacker facts for kids

https://kids.kiddle.co/Hacker

Also In The December 2020 Issue

Welcome to the far away land of the Ein Lifon where the number of appendages you have changes how you count!

You've looked at and used Susan Kare's work, or work inspired by hers, every time you use a computer.

Through the example of Theo Jansen and his Strandbeests we discuss the importance of fostering creativity and innovation in students.

From gopherspace to geminispace, the small internet is a lot bigger than you think!

Learn how asymmetric encryption and prime numbers help keep you safe online!

What could we accomplish if batteries lasted forever? These two companies want to find out!

Interesting stories about computer science, software programming, and technology for December 2020.

Receive an email announcement of new issues, sent every two months, plus a monthly newsletter with curated site content.

No, thanks!