Ethical Hacking
Image by Drunk Photographer on Flickr
Learn how you can use your hacking super powers for good!
When you imagine a hacker, what do they look like? You might think of someone from the movies with a cool pair of shades. Maybe you imagine someone in a balaclava typing away on their keyboard!
However, not every hacker is a bad guy. Some people have the skills and the knowledge to cracka advanced security systems, but they choose not to use it to do harm. Instead, they actually make a legal and productive career out of it!
This career path is known as “ethical hacking.” It’s ethical because the hacker doesn’t break into people’s computers without permission. Instead, the hacker looks for people who want someone to break their security.
So, what kind of person wants someone to break into their computer? Big companies with lots of sensitive and personal data on computers. If a hacker manages to get in and steal or delete the data, it would be really bad for the company.
To stop this, businesses put up lots of tough cybersecurity defenses to stop hackers from getting in. However, not all defenses are perfect, and there may be a way that a hacker can find a flaw or weakness that they can use to get in.
As such, once a company has the defenses in place, they want to know if it’s working properly or not. The best way to know if a hacker can get in or not is to…hire a hacker!
This is where ethical hacking comes into play. If a company wants to put its security to the test, they can hire people to hack into the network. If the hacker manages to get in, the hacker reports how they did it to the company. The company can then patch up the problem to prevent future attacks.
Sometimes a company doesn’t hire a hacker; instead, they post what’s called a “bug bounty.” This sounds like a WANTED poster with a cockroach on it, but it means something entirely different in the security world!
When a company posts a bug bounty, they make a public statement that they want someone to crack into its system and give the company proof of the deed. If a hacker manages to complete the challenge and show the company how they did it, the company gives the hacker a lot of money.
How much money? A LOT of money. You can see some examples if you look up Microsoft Bounty programs. Finding a flaw on the small programs will net you $15-20k, and finding a flaw in Microsoft’s most secure systems gets you a whopping $100k!
You can see, then, how people who love cracking security can make a legal job out of their skillset. If you’re interested in security yourself, be sure to consider becoming an ethical hacker yourself!
Learn More
White hat hacker
https://www.varonis.com/blog/white-hat-hacker/
Microsoft Bounty Programs
https://www.microsoft.com/en-us/msrc/bounty
What Is Ethical Hacking?
https://www.eccouncil.org/ethical-hacking/
Bug Crowd
https://www.bugcrowd.com/bug-bounty-list/
three types of hackers
https://www.designworldonline.com/what-are-the-three-types-of-hackers/
Red and white hacking
https://searchsecurity.techtarget.com/answer/What-is-red-and-white-hat-hacking
Bug Bounties and how they work
https://ostif.org/bug-bounties-what-they-are-and-why-they-work/
Skills of bug bounty
https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4
Ethical hacking for kids
https://www.amazon.com/Hacking-Kids-Bryson-Payne/dp/1718500009
Prepare kids for a career in cybersecurity
https://resources.infosecinstitute.com/how-to-get-kids-prepared-for-a-career-in-cybersecurity/
Kids learn to hack
https://www.youtube.com/watch?v=r5aZPArWyaI
Hacker facts for kids
Also In The December 2020 Issue

Welcome to the far away land of the Ein Lifon where the number of appendages you have changes how you count!

You've looked at and used Susan Kare's work, or work inspired by hers, every time you use a computer.

A fun SketchUp walk-through for pinwheel enthusiasts!

Through the example of Theo Jansen and his Strandbeests we discuss the importance of fostering creativity and innovation in students.

From gopherspace to geminispace, the small internet is a lot bigger than you think!

Meet lisp, one of the oldest and simplest families of programming languages out there!

A fun craft for anyone who wants to combine their love of sewing and tech!

Learn how asymmetric encryption and prime numbers help keep you safe online!

Use OPP to make better python generated stories!

Desertification in the Sahel is a serious issue, but this model may offer a solution!

What could we accomplish if batteries lasted forever? These two companies want to find out!

Exploring another one of programmings many strange sounding but useful terms!

Learn how you can use your hacking super powers for good!

Links from all the stories in this December 2020 issue of the magazine!

Interesting stories about computer science, software programming, and technology for December 2020.