{"id":7463,"date":"2014-06-26T17:53:57","date_gmt":"2014-06-26T12:23:57","guid":{"rendered":"https:\/\/internshala.com\/blog\/?p=7463"},"modified":"2022-07-19T15:30:40","modified_gmt":"2022-07-19T10:00:40","slug":"hacking-common-myths-careers","status":"publish","type":"post","link":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/","title":{"rendered":"Hacking : The common myths and careers"},"content":{"rendered":"<div class=\"im\" style=\"color: #500050;\">\n<p dir=\"ltr\" style=\"text-align: justify;\"><span style=\"font-style: italic;\">&#8220;To beat a hacker, you need to think like one!&#8221; &#8211;\u00a0<\/span><span style=\"font-style: italic;\">EC-Council<\/span><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">White hat, black hat, gray hat. Wondering what these are? Surely not those colourful hats sold on the beaches of Goa. These are the different categories into which hackers are often categorised based on their behaviour. Hacker is often interpreted as a \u201ccriminal\u201d or a \u201cbad guy\u201d. He manages to seek and exploit weaknesses in computer software systems. The definition is pretty controversial and invites a lot of eye stares. But what about the ethical ones of the lot? Let\u2019s look at all the categories closely.<\/p>\n<figure id=\"attachment_7464\" aria-describedby=\"caption-attachment-7464\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7464 size-full\" src=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat.jpg\" alt=\"White Hat vs Black Hat\" width=\"595\" height=\"365\" srcset=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat.jpg 595w, https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat-300x184.jpg 300w, https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat-332x205.jpg 332w, https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat-268x164.jpg 268w, https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat-150x92.jpg 150w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/a><figcaption id=\"caption-attachment-7464\" class=\"wp-caption-text\">White Hat vs Black Hat<\/figcaption><\/figure>\n<p dir=\"ltr\" style=\"text-align: justify;\">A <span style=\"font-weight: bold;\">black hat<\/span> hacker exploits computer security for personal gain (like stealing) or for pure maliciousness. They are the ones who fit the stereotype of hacking associated with unethical practices. A <span style=\"font-weight: bold;\">white hat<\/span> hacker, completely opposite of the black hat hacker, is involved into ethical hacking practices. Like the former, the latter does exploit the weakness in the computer software and finds loopholes but with prior permission of the reporting organisation. Instead of vandalizing the security system, he reports them to the respective organisation, allowing the organisation to improve its defenses through a process known as \u201cpenetration testing\u201d. Organisations often pay large amount of money to white hackers to be able to discover such vulnerabilities. As they say, it\u2019s never black or white, it\u2019s gray. So there exists <span style=\"font-weight: bold;\">gray hat<\/span> hacker who might gain access to the software for personal gain, but might make the company aware of its loopholes in the end. Since he isn\u2019t granted the right for access, it might be considered as illegal or unethical hacking.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Organisations which take cyber security very casually end up becoming victims of cyber crimes. Ethical hackers are required to curb this menace of cyber crimes.\u00a0They save the organisations from anti-social online attacks, through figuring out the loopholes. And they get paid for using their destructive mind in a rather constructive way.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Most companies that use the services of ethical hackers are in the banking or technology sector. Banks naturally have a lot of money riding on security and IT companies have contractual data <a href=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/Hacking.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-7465\" src=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/Hacking-300x247.jpg\" alt=\"Hacking\" width=\"300\" height=\"247\" srcset=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/Hacking-300x247.jpg 300w, https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/Hacking-150x123.jpg 150w, https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/Hacking.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>protection obligations with clients. So white hat hackers are pretty much in demand. But according to the 2014 National Cyber Security Policy, India needs almost 500,000 cyber security experts, while rough estimates put the current available personnel at about 30,000.\u00a0The reason for such low numbers are lack of implementation of proper cyber laws, less cyber crimes research and fewer educational centres offering hacking as a course. In order to make ethical hacking accessible to large number of people, there is a need to revamp and align college curriculum.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">The demand for ethical hackers is not limited only to the IT sector. Such experts are required by financial service providers, airlines, retail chains, hotels and e-commerce companies. Government agencies such as military and law enforcement agencies, defence organisations, forensic laboratories, detective companies, investigative services offer challenging roles for ethical hackers. Some skilled hackers also get to to work for investigation agencies like the Central Bureau of Investigation, the National Security Agency and the Federal Bureau of Information. Some large organisations employ security testers and others use contractors to audit their systems.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Internshala offers\u00a0<a href=\"https:\/\/trainings.internshala.com\/hacking-course\/?utm_source=IS_Blog&amp;referral=BLOG10&amp;utm_medium=hacking-common-myths\" target=\"_blank\" rel=\"noopener noreferrer\">training in\u00a0ethical hacking<\/a>\u00a0as part of its Online Summer Trainings. We realise the need for ethical hackers and the growing demand to learn the same. Our experts equipped with proficient knowledge regarding the course clear any student doubts through live chats and forums.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">So get down and become a clever hacker, and provide your services to the organisations in need. Don\u2019t forget to wear your white hat!<\/p>\n<p dir=\"ltr\" style=\"color: #222222;\"><em><span style=\"color: #000000;\">Referred Articles:\u00a0<\/span>http:\/\/www.business-standard.com\/article\/companies\/cyber-emergency-teach-train-and-employ-half-a-million-ethical-hackers-114030501258_1.html<\/em><\/p>\n<p dir=\"ltr\" style=\"color: #222222;\"><em>\u00a0Image Credits:\u00a0<span style=\"color: #000000;\">blog.rivalhost.com,\u00a0<\/span>techonn.com<\/em><\/p>\n<\/div>\n<aside class=\"mashsb-container mashsb-main \"><div class=\"mashsb-box\"><div class=\"mashsb-count mash-medium\" style=\"float:left\"><div class=\"counts mashsbcount\">276<\/div><span class=\"mashsb-sharetext\">SHARES<\/span><\/div><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-medium mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Finternshala.com%2Fblog%2Fhacking-common-myths-careers%2F\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-subscribe mash-medium mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Get&nbsp;Your&nbsp;Dream&nbsp;Internship<\/span><\/a><div class=\"onoffswitch2 mash-medium mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.42-->","protected":false},"excerpt":{"rendered":"<p>&#8220;To beat a hacker, you need to think like one!&#8221; &#8211;\u00a0EC-Council White hat, black hat, gray hat. Wondering what these are? Surely not those colourful hats sold on the beaches<\/p>\n","protected":false},"author":5283,"featured_media":7464,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3943,4140],"tags":[3621,3868],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking myths and careers<\/title>\n<meta name=\"description\" content=\"Internshala decodes the myths behind hacking and explores career options in the field\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking myths and careers\" \/>\n<meta property=\"og:description\" content=\"Internshala decodes the myths behind hacking and explores career options in the field\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\" \/>\n<meta property=\"og:site_name\" content=\"Internshala blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-26T12:23:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-19T10:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"595\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Meenakshi Kukreja\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Meenakshi Kukreja\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\"},\"author\":{\"name\":\"Meenakshi Kukreja\",\"@id\":\"https:\/\/internshala.com\/blog\/#\/schema\/person\/9772a94a3c306c89af2bf049e629d201\"},\"headline\":\"Hacking : The common myths and careers\",\"datePublished\":\"2014-06-26T12:23:57+00:00\",\"dateModified\":\"2022-07-19T10:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\"},\"wordCount\":640,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/internshala.com\/blog\/#organization\"},\"keywords\":[\"hacking\",\"VTC\"],\"articleSection\":[\"e-Learning\",\"Internship Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\",\"url\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\",\"name\":\"Hacking myths and careers\",\"isPartOf\":{\"@id\":\"https:\/\/internshala.com\/blog\/#website\"},\"datePublished\":\"2014-06-26T12:23:57+00:00\",\"dateModified\":\"2022-07-19T10:00:40+00:00\",\"description\":\"Internshala decodes the myths behind hacking and explores career options in the field\",\"breadcrumb\":{\"@id\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/internshala.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"e-Learning\",\"item\":\"https:\/\/internshala.com\/blog\/e-learning\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacking : The common myths and careers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/internshala.com\/blog\/#website\",\"url\":\"https:\/\/internshala.com\/blog\/\",\"name\":\"Internshala blog\",\"description\":\"Your favourite senior outside college\",\"publisher\":{\"@id\":\"https:\/\/internshala.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/internshala.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/internshala.com\/blog\/#organization\",\"name\":\"Internshala blog\",\"url\":\"https:\/\/internshala.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/internshala.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2023\/08\/LOGO-1.png\",\"contentUrl\":\"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2023\/08\/LOGO-1.png\",\"width\":112,\"height\":31,\"caption\":\"Internshala blog\"},\"image\":{\"@id\":\"https:\/\/internshala.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/internshala.com\/blog\/#\/schema\/person\/9772a94a3c306c89af2bf049e629d201\",\"name\":\"Meenakshi Kukreja\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/internshala.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8694199c53446849fe14907390bee01?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8694199c53446849fe14907390bee01?s=96&d=mm&r=g\",\"caption\":\"Meenakshi Kukreja\"},\"url\":\"https:\/\/internshala.com\/blog\/author\/meenakshi_kukreja\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking myths and careers","description":"Internshala decodes the myths behind hacking and explores career options in the field","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/","og_locale":"en_US","og_type":"article","og_title":"Hacking myths and careers","og_description":"Internshala decodes the myths behind hacking and explores career options in the field","og_url":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/","og_site_name":"Internshala blog","article_published_time":"2014-06-26T12:23:57+00:00","article_modified_time":"2022-07-19T10:00:40+00:00","og_image":[{"width":595,"height":365,"url":"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2014\/06\/White-Hat-vs-Black-Hat.jpg","type":"image\/jpeg"}],"author":"Meenakshi Kukreja","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Meenakshi Kukreja","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#article","isPartOf":{"@id":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/"},"author":{"name":"Meenakshi Kukreja","@id":"https:\/\/internshala.com\/blog\/#\/schema\/person\/9772a94a3c306c89af2bf049e629d201"},"headline":"Hacking : The common myths and careers","datePublished":"2014-06-26T12:23:57+00:00","dateModified":"2022-07-19T10:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/"},"wordCount":640,"commentCount":4,"publisher":{"@id":"https:\/\/internshala.com\/blog\/#organization"},"keywords":["hacking","VTC"],"articleSection":["e-Learning","Internship Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/","url":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/","name":"Hacking myths and careers","isPartOf":{"@id":"https:\/\/internshala.com\/blog\/#website"},"datePublished":"2014-06-26T12:23:57+00:00","dateModified":"2022-07-19T10:00:40+00:00","description":"Internshala decodes the myths behind hacking and explores career options in the field","breadcrumb":{"@id":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/internshala.com\/blog\/hacking-common-myths-careers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/internshala.com\/blog\/"},{"@type":"ListItem","position":2,"name":"e-Learning","item":"https:\/\/internshala.com\/blog\/e-learning\/"},{"@type":"ListItem","position":3,"name":"Hacking : The common myths and careers"}]},{"@type":"WebSite","@id":"https:\/\/internshala.com\/blog\/#website","url":"https:\/\/internshala.com\/blog\/","name":"Internshala blog","description":"Your favourite senior outside college","publisher":{"@id":"https:\/\/internshala.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internshala.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/internshala.com\/blog\/#organization","name":"Internshala blog","url":"https:\/\/internshala.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/internshala.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2023\/08\/LOGO-1.png","contentUrl":"https:\/\/internshala.com\/blog\/wp-content\/uploads\/2023\/08\/LOGO-1.png","width":112,"height":31,"caption":"Internshala blog"},"image":{"@id":"https:\/\/internshala.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/internshala.com\/blog\/#\/schema\/person\/9772a94a3c306c89af2bf049e629d201","name":"Meenakshi Kukreja","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/internshala.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8694199c53446849fe14907390bee01?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8694199c53446849fe14907390bee01?s=96&d=mm&r=g","caption":"Meenakshi Kukreja"},"url":"https:\/\/internshala.com\/blog\/author\/meenakshi_kukreja\/"}]}},"_links":{"self":[{"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/posts\/7463"}],"collection":[{"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/users\/5283"}],"replies":[{"embeddable":true,"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/comments?post=7463"}],"version-history":[{"count":0,"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/posts\/7463\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/media\/7464"}],"wp:attachment":[{"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/media?parent=7463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/categories?post=7463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internshala.com\/blog\/wp-json\/wp\/v2\/tags?post=7463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}