Recent in Technology

Cybersecurity Vs Ethical Hacking


 


Cybersecurity Vs Ethical Hacking 


Ethical Hacking is a topic that is often talked about, so let's move on to Cybersecurity this time.


In the US, the word Cybersecurity is used together as one word. In the UK, Cyber Security is used in a different way. Collation and separation are true and have the same meaning. I use the US more than the UK. Even the letters that sound different are used in the US, so let's just use Cybersecurity.




Technology is evolving day by day. In today's life, technology and the Internet have become essential things. As technology advances, so does the use of technology products. In the world, the number of devices connected to the Internet is no different from yesterday to today. The Internet and technology have become an essential part of our daily lives, and financial matters have become things that can be managed on a phone.




I can shop with just one phone. the clothes you want cosmetics Household appliances Diamonds, gold, jewelry, etc., can be found and ordered at home with a small phone. As technology advances and spreads, the benefits and side effects of technology also come together again.


In addition to the phones in our hands, computer systems, Network systems, websites (web servers); Unauthorized use of information (stored) on the Internet, etc. Stealing The prevention of side effects associated with destruction (destruction) is often called Cybersecurity.




We often hear and see fraud from X Pay, The money from the Card or Bank acc connected to X Pay Acc was stolen...etc. The page was hacked, etc. are well-known cyber threats. There are data breaches that are unknown to everyone. There are still many cyber threats such as servers being attacked and being attacked with malware. These cyber threats can exist in various forms and places, so using various technologies and methods to prevent them is called Cybersecurity.




In the field of security, there is a CIA triad. CIA (not US intelligence agency) stands for Confidentiality, Integrity and Availability. The 3 most important points of a security system. In short, our data must be secure. Must be trustworthy. It should be accessible when needed (even if the servers where it is kept are damaged by weather or war).


Confidentiality refers to the protection of sensitive information from unauthorized disclosure or access. 

Integrity means ensuring that data is not tampered with or modified in any way that could result in harm to the organization or individual. 

Availability means that data is accessible when needed. 

Cybersecurity is trying to make the damn CIA triad stronger. We work to protect sensitive information on the Internet, starting from each individual. There is a relationship between corporations and the government. Since there are many cyber threats such as malware, viruses, phishing attacks, denial of service (DoS) attacks, ransomware, etc., as I said earlier, we try to protect them using all methods. So, what methods do Cybersecurity Professionals use, such as monitoring network traffic? such as identifying malicious code and blocking it; They use methods such as trying to respond immediately to security incidents. There's a lot to do in each one, so I won't go into detail about them. I just want to make it easy for everyone to understand.


The direct opposite of Cybersecurity Professionals are Cybercriminals. Cybercriminals are also looking for new vulnerabilities that can be exploited on computer systems, so it is always full of challenges for Cybersecurity Professionals.


Overall, there are many threats in cyber space. In order to escape from these threats and get the CIA, Cybersecurity is an essential thing for the new age (technological age).




ok So, let's talk about the difference between Ethical Hacking and Cybersecurity given at the beginning.




Ethical hacking and cybersecurity are two separate fields, although they are closely related. Although they may be the same in the academic field, they are different in the field of work.


Also known as White Hat Hacking / Penetration Testing / Ethical Hacking, the main point of Ethical Hacking is to check the security of computer and network systems, including websites. They identify the weaknesses (missing points) in the systems and report them to the relevant organization. Let's say we take a proactive approach to protect against cyber attacks.


Cybersecurity is not only the phones in our hands, but also computer systems, Network systems, websites (web servers); Unauthorized use of information (stored) on the Internet, etc. Stealing In order to prevent the side effects associated with destruction (destruction), counter measures such as firewalls, antivirus software, and intrusion detection systems are implemented and security awareness training is also conducted.


So, in short, while Ethical Hacking focuses on identifying the weaknesses of computer and network systems, Cybersecurity continues to do things to ensure the safety of those computer and network systems.


So Cybersecurity can be broadly defined as a broader set of activities.




So Cybersecurity Professional The things that an ethical hacker will learn are basically the same.


If you want to become a Cybersecurity Professional, you will need to continue to study topics such as Ethical Hacking, Intrusion Detection, Incident Response, etc.



Khit Minnyo (14.3.2023) 12:23PM

Post a Comment

4 Comments

People