Monday, March 8, 2021

When You Read the Word, "Hacker..."

Watch many 1980s films, and you may come across the "hacker" character -- a post-punk, mohawk-sporting teen looking to upgrade test scores or avert world wide nuclear confrontation with the Ruskies. In the decades since, it seems that “hacker” describes cyber criminals more than heroes, an unfortunate trope promulgated by modern media. Often accompanied by stock photos of hoodie-clad thugs hunched over glowing keyboards in darkened rooms, the predominance of associating this label with internet criminals has skyrocketed. As data breaches and cyber attacks litter the front pages of mainstream media, the "white hat" computer expert is lost in the shuffle. Calling scammers, cheats, fraudsters and others "hackers" is counter-productive -- lack of precision means the term becomes diluted.

Promoting the image of hackers as inherently malicious ignores the truth -- corporate America and the U.S. government employ thousands (and there's even more, world-wide) as so-called ethical hackers. These brainiacs help organizations find and remediate security vulnerabilities in their systems. Some businesses offer bug-bounty programs, paying hackers that find and report security flaws. To quote Keren Elazari, security analyst, hackers are “the immune system of the internet.”

We have read the work “hacker” used within the security community to refer to someone skilled in computers and network security. Its use as term for “cyber criminal” alter the perception of the general public. There is a nomenclature to differentiate malicious, illegal penetration and other cyber intrusions (perpetrated by “black hat hackers”). Black hat hackers hate society use technology to exploit people, ruin lives, steal, or incite hatred - they use technology skills to exploit vulnerabilities in software and humans. The ethical hacker is a computer and networking expert who systematically attempts to analyze and penetrate a system on behalf of its owners for the purpose of finding vulnerabilities that a malicious party could potentially exploit. Hackers are the good guys.

Read more over at this place...

No comments:

Post a Comment