Today’s is the discussion one. So before move on to the discussion, I want to ask you one thing or basically it’s a question.
“What do you
think about hacking?”
I think most
of them think like the following:
“It’s a bad
and they steal the data for illegal purposes”. Right, but I said it is not fully
right.
Hey, are you
support those illegal activities.
No. I’m not.
But there is a misunderstanding in this concept. So I want to clear the
misunderstanding about hacking.
Then are you
say that all the hackers are goo.
No. I’m not.
But there are some good hackers who are also in this place. So I want you to
know the details about that one. Is that clear? Now move on to our today’s
content. Here we explain the three things such as the definition part,
types of hackers, and conclusion part.
Ok, first
the definition part. But there are two sides to the definition are available. First
one is a positive side, hacking is the way to identify the weak part of the system and
the second one ii negative sides, hacking refers to the misuse of devices like
smartphone, computer, etc to cause damages or corrupt the system or to gather
information on users, steal data and documents or disrupt data related
activities.
I think now you
slightly understand my point right. But once you read the following you got a
clear idea about what I’m saying.
Now the
types of hackers.
Hey! Wait you
don’t define the term hackers?
Oh! Right! Hackers
are the person who can do hacking.😊😊😊😊😊
Don’t get
angry. Calm yourself.
Look the
types of hackers to understand the motivation of hackers because each of the
hackers is different based on their motive. So the type part is the best option
for you to understand it better.
There are three
types of hackers.
- White hat hacker: They can do hack the system that they have permission to hack in order to test the security of the system. Which means they are the one to helps the user to identify the weakness of the system
- Black hat hacker: They hack the system to do illegal activities such as steal the data disrupt the data
- Grey hat hackers: They are the hybrid version between the white and black hat hackers. Basically they can hack the system illegally but they can’t do it to steal the data in most cases they did it to alert the administrator that their system has weak points. So we can’t identify them as good or bad. Sometimes their activities are considered to be legal but sometimes not.
I think
after reading those types now all of you know that why I said you’re wrong? Right.
Because all the hackers are not bad there are some good hackers who are also in this
field.
But why I choose
this one for today’s topic? Because I have seen so many people have the
wrong idea about the concept of hacking. They think that hacking is an illegal
thing. But it is not hacking is also has the advantage which means if you want
to protect your data, then you must know the weak points of it. Without hacking
you can’t get it. So hacking has its own type of advantage also.
But it is
not correct in all places. If someone is using for illegal activities, then
they must be punished for that.
I think now
you got the point right. Thank you for reading!! Today’s article is very short
but I want to make it crisp and clear that’s why it is like it.
If you think
the content given here is valuable, then share it with your friends and
colleagues.
At the same,
if you found any corrections, share them with me through the comments section.
Once again
thank you for reading!!!