Archive for May 2014
Cyber Security Skills for the Real World
Cyber
Security Skills for the Real World
Hacking is a method of problem solving that combines resourcefulness,
logic, creativity, and study. Hacker Highschool helps teens learn hacking as a
method to figure out how things work (such as with the Scientific Method) and
to further learn by doing. Hacking is usefully applied in nearly all fields as
it builds upon what is known to create new things, foods, designs, etc. When
applied to computers and networks, it also teaches safety and security in a
world quickly drowning in information where to be safer teens today need to
know the facts from the fraud, the real from the fake, and the bad from the
good.
Hacker
Highschool is practical because security awareness has to be the continuing
practice of a skill and not just the continuous reminder of a threat. That's
why we need teens to actively take on real hacking attacks. Like a fire drill
or even driver education, students need real practice if they want to learn how
not to end up a victim.
ethical hacking
Ethical
hacking
Ethical
hacking and ethical hacker are terms that describe hacking performed to help a
company or individual identify potential threats on the computer or network. An
ethical hacker attempts to hack their way past the system security, finding any
weak points in the security that could be exploited by other hackers. The organization
uses what the ethical hacker finds to improve the system security, in an effort
to minimize, if not eliminate, any potential hacker attacks. In order for
hacking to be deemed ethical, the hacker must obey the below rules.
1. You have
permission to probe the network and attempt to identify potential security
risks. It is recommended that if you are the person performing the tests that
you get written consent.
2. You
respect the individual's or company's privacy and only go looking for security
issues.
3. You report
all security vulnerabilities you detect to the company, not leaving anything
open for you or someone else to come in at a later time.
4. You let
the software developer or hardware manufacturer know of any security vulnerabilities
you locate in their software or hardware if not already known by the company.