You are on page 1of 2

(* sorry for late submission sir) some info are recived from wikipedia

Article on Hacking and Penetrating

First of all what is hacking ?
Hacking is a process of testing the security of any object either virtual or real world .it exist on physical world and both
virtual world. Hacking itself is not the crime. it is the way which a hacker use make it a crime. Hacking is also highly skilled
work which is meant to be unique and different so the defender or cilentos (target ) is not aware and not ready to defend. And
hacking is done. Some of most common hacking done on virtual world is Penetrating.

What is Penetration Testing?

Penetration testing is a type of security testing that is used to test the insecurity of an application. It is conducted to find the
security risk which might be present in the system.If a system is not secured, then any attacker can take authorized access to
that system. Security risk is normally an accidental error that occurs while developing and implementing the software. For
example, configuration errors, design errors, and software bugs,loop holes etc. Penetration testing normally evaluates a
systems ability to protect its networks, applications, users from external or internal threats. It also attempts to protect the
security controls and make sure that only authorized access are ggiven access. Penetration testing shows us thethe actions
of an external or/and internal cyber attacker/s that is intended to break the information security and hack the
valuable data or disrupt the normal functioning of the organization. So, with the help of advanced tools and
techniques, a penetration tester (also known as ethical hacker) makes an effort to control critical systems and
acquire access to sensitive data.

What is hacking?

Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally
entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either
to harm the systems or to steal sensitive information available on the computer.Hacking is usually legal as long as it is being
done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical
Hacking. Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide
range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker"
was originated. Hackers can be classified into different categories such as white hat, black hat, and grey hat, based
on their intent of hacking a system.

Body part

Penetration testing is a combination of techniques that considers various issues of the systems and tests, analyzes,
and gives solutions. It is based on a structured procedure that performs penetration testing step-by-step. Planning
and preparation starts with defining the goals and objectives of the penetration testing.The client and the tester
(hackrs) jointly define the goals so that both the parties have the same objectives and understanding. The common
objectives of penetration testing are

To identify the vulnerability and improve the security of the technical systems.
Have IT security confirmed by an external third party.
Increase the security of the organizational/personnel infrastructure.
Avoid unwanted access