Hacking is the process of finding vulnerabilities in a system and using these found vulnerabilities to gain unauthorized access into the system to perform malicious activities ranging from deleting system files to stealing sensitive information. Hacking is illegal and can lead to extreme consequences if you are caught in the act.

Phases of Ethical Hacking

Like every discipline out there in the world, ethical hacking is divided into distinct phases. Ethical hacking has 6 distinct phases. These phases are not strict rules, but more like a guideline to be followed.

1. Reconnaissance — Reconnaissance is the process of information gathering. In this phase, the hacker gathers relevant information regarding the target system. These include detecting services, operating systems, packet-hops to reach the system, IP configuration, etc. Various tools like Nmap, Hping, Google Dorks, etc are used for reconnaissance purposes.

2. Scanning — In the scanning phase, the hacker begins to actively probe the target machine or network for vulnerabilities that can be exploited. Tools like Nessus, Nexpose, and NMAP are widely used by hackers in this process.

3. Gaining Access — In this phase, the vulnerability located during scanning is exploited using various methods and the hacker tries to enter the target system without raising any alarms. The primary tool that is used in this process is Metasploit.

4. Maintaining Access — This is one of the most integral phases. In this phase, the hacker installs various backdoors and payloads onto the target system. Just in case you don’t know, Payload is a term used for activities performed on a system after gaining unauthorized access. Backdoors help the hacker gaining quicker access to the target system in the future.

5. Clearing Tracks — This process is an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process. Nonetheless, Ethical Hackers still have to perform this phase to demonstrate how a Black Hat Hacker would go about his activities.

CONFIDENTIALITY

Confidentiality is the keeping of another person or entity’s information private.

Examples of confidential information

01) Bank account statements

02) Personal information

03) Credit card numbers

04) Trade secrets

05) Government documents

Measures of keep information confidential

01)Encryption

02) Password

03) Two-factor authentication

04) Bio-metric

Measures to Protect Computer Security

There are numerous ways in which computer systems and data can be compromised and many ways to protect computer security.

These measures include:

• Access can be restricted through biometric scanning devices and passwords (secret words or phrases; dictionary attacks use thousands of words to attempt to gain access); security suites, firewalls, and password managers help with security tasks.

  • Encrypting is coding information to make it unreadable except to those who have the encryption key. Hypertext transfer protocol secure (https) requires browsers and websites to encrypt all messages. Virtual private networks (VPNs) encrypt connections between company networks and remote users. WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks.

Hope you enjoyed the article.

Thank you!!

Software engineering undergraduate