Archive for May 2014

Cyber Security Skills for the Real World

Cyber Security Skills for the Real World


          






          Hacking is a method of problem solving that combines resourcefulness, logic, creativity, and study. Hacker Highschool helps teens learn hacking as a method to figure out how things work (such as with the Scientific Method) and to further learn by doing. Hacking is usefully applied in nearly all fields as it builds upon what is known to create new things, foods, designs, etc. When applied to computers and networks, it also teaches safety and security in a world quickly drowning in information where to be safer teens today need to know the facts from the fraud, the real from the fake, and the bad from the good.

                   Hacker Highschool is practical because security awareness has to be the continuing practice of a skill and not just the continuous reminder of a threat. That's why we need teens to actively take on real hacking attacks. Like a fire drill or even driver education, students need real practice if they want to learn how not to end up a victim.


Wednesday, May 28, 2014
Posted by Anonymous

ethical hacking







Ethical hacking

             Ethical hacking and ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks. In order for hacking to be deemed ethical, the hacker must obey the below rules.

1. You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent.

2. You respect the individual's or company's privacy and only go looking for security issues.

3. You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time.


4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
Saturday, May 24, 2014
Posted by Anonymous

Total Pageviews

- Copyright © REDBACK COUNCIL - RISC -- Powered by Redback - Designed by Redback Council -