In a follow up to my post about ethical hackers, I found an article about a Cyber Challenge which was looking into getting teenagers and young adults, who have are partial to hacking, interested in cybersecurity jobs. “In the eyes of the organizers of the Maryland Cyber Challenge and Conference, today’s hacker could be tomorrow’s cybersecurity hero.” Realizing that there is a shortage of security professionals in the work force, those who ran the whole conference, intended to help those who attended see the great aspects of cybersecurity. The challenge itself was:
an all-day brain tester for eight high school and eight college teams. The college students had to hack into a computer, gain control, and rummage through files for valuable information. Meanwhile the high-schoolers were required to defend six computer servers against attacks by cunning computer professionals seated across the room.
It would seem that the “Ethical Hacker” is a much needed resource in this day and age.
The way information travels has continually advanced as time has passed. At first there were letters, then there was radio and television, and in the present day we have the Internet. With each technological advancement the speed at which this information travels has increased exponentially, especially today. Therefore, any sort of news of them spreads quite quickly. According to an article at HomelandSecurityNewsWire.com, “social media sites have proven useful in quickly disseminating information, and raising awareness during disasters or disease outbreaks.” However, the only problem with information passing in this manner is that it can be a “double-edged sword” because any number of times this new information could just be a false rumors or false information in general. This can be especially troubling in the case of news about epidemics, natural disasters, and the like.
Info obtained from:http://www.homelandsecuritynewswire.com/social-media-double-edged-sword-epidemics
When it comes to cyber attacks, no matter the purpose behind the attack, it always seems to cause harm. As we have found, attacks can be perpetrated for a number of reasons, some meant to be harmful and some not particularly so. However, whichever the case the victims of the attack tend to be harmed regardless. For example, the sportswear company Adidas website suffered an attack by unknown forces, this was discovered on Thursday. Currently investigation of this incident is going on and they have not found that any consumer data has been impacted. Despite this they have shutdown the site and will keep it this way until the investigation is complete and all problems are resolved. So in the end, although the attack itself may have not done any particularly harm it has caused the site to be shutdown which will affect the company anyway.
Adidas attack info: http://www.straitstimes.com/BreakingNews/TechandScience/Story/STIStory_731336.html
For those people out there that enjoy hacking but don’t want to worry about the consequences one may have to face because you are doing something unlawful, there’s a job in it for you. An ethical hacker is someone who rather than hacks to, for example, steal, instead hacks when hired to find weaknesses in a company’s security.
Hacking becomes a job, and a job means making money. As a ethical hacker one has a decent pay grade. Depending on the jobs you take on as well as your experience, a person can make between $60,000 and $100,000 if not more.
In the end, being an ethical hacker is a complete win-win situation. Hacking to your hearts content is now a possibility, plus you earn a steady income and the chances of serving time have been eliminated. If you want to hack being an ethical hacker seems to be the way to go.
info obtained from: http://www.nypost.com/p/news/business/jobs/what_up_with_that_job_73bcepcf42NSN1m1fRsr2I?CMP=OTC-rss&FEEDNAME=
An article called ‘They’ Really Are Watching You discusses the several ways that some, for example advertising companies or web analytics companies, track people through their digital fingerprints. In the end, I felt that it all comes down to your computer’s cookies, cookies are what allow these companies to track you.
One way method explained by the article, said to by the simplest, was,
An advertising network can track you is by putting a “third party” browser cookie on your computer when you visit a site to which it supplies advertisements. When you visit another site that uses the same advertising network you can be identified by that cookie. As time goes on, it will build up a picture of your browsing habits
After reading the article I felt that, although those described in the article have no particular malicious intent, it’s so simple for them to track you, what will happen when a person or group comes along does?
link to the article: http://www.esecurityplanet.com/browser-security/they-really-are-watching-you-1.html