dcsimg

Why Big Companies Want You To Be A Hacker

by Justin Boyle

Home >> Articles >> Computer Training >> Why Big Companies Want You To Be A Hacker

Let's be honest. You're afraid of hackers.

Every time some grand cyber-crime is perpetrated, news media tell you "hackers" are behind it. Whenever one of your friends' Facebook accounts starts spraying garbled spam all over your timeline, what do you tell them? "I think you got hacked." Hackers are associated with all things malicious and inconvenient that might happen to your digital life.

In reality, hackers are some of the most important good guys of the information age. If it weren't for hackers, hundreds of millions of dollars safely changing hands over PayPal every day might've been a wild fantasy.

Why companies need hackers for hire

Good hackers are like gold to e-commerce and information security companies. The "hacker mindset," a spontaneous and lateral thought process bent on violating expectations and breaking the rules of a system with surgical precision, helps them see through holes and exploits that system designers may not have noticed.

The reason that hackers for hire are such a big part of the world of digital convenience is that, frankly, hackers will find security holes anyway. Hackers tend to also have a powerful intellectual curiosity and an unquenchable thirst for access to places they're not supposed to be. Companies can either pay them to do it and fix security flaws before their software is released, or they can just let their product out into the wild and keep their fingers crossed.

A pirate's life

A couple hundred years ago, national companies that shipped goods up and down coasts and across the sea had to worry as much about pirates as companies who ship software do today.

One solution that was used in the days of Piracy 1.0 was to find and hire ship captains with the same sort of skills and knowledge pirates had -- wily independent traders, seasoned pirate-hunters or actual former pirates were all popular choices -- and contract them as privateers. Once on the payroll, these professionals who understood the "pirate mindset" could help nations take smarter and more precise security measures in their dealings.

Of course, back then, "pirate mindset" contractors were sometimes hired to do things less ethical than simply finding vulnerabilities in a company's trade routes (like hijacking a rival nation's cargo ships) until privateering was abolished in 1856. Since the practice of hiring hackers could easily develop fuzzy ethical boundaries, some controls are already in place.

Certified ethical hackers and pen testers

When hackers around for holes in system security while on contract or payroll, it's called penetration testing, or pen testing. When hiring their pen testers, though, how can a company be sure that they're letting the right person explore the vulnerabilities in their software?

They could try and hire based on independent reputation alone, but the International Council of E-Commerce Consultants (EC-Council) offers another solution. Among the many programming and security certifications provided by EC-Council is the Certified Ethical Hacker (CEH) credential, which trains aspiring hackers for hire in a list of security domains that includes the following:

  • Footprinting and reconnaissance
  • Network enumeration
  • Viruses and worms
  • Session hijacking
  • Hacking wireless networks
  • Structured Query Language (SQL) injection
  • Buffer overflow
  • Cryptography

Not only does the credential provide instruction on hacker tools and techniques, but it can serve as a stamp of credibility among enterprise IT managers. To become a fully licensed penetration tester, candidates must have the CEH certification as well as the EC-Council Certified Security Analyst (ECSA) credential, and, naturally, submit a full criminal background check.

Thank a hacker

When it comes down to it, hackers aren't pathological vandals out to wreck your life. They're really just people with a passion for using information in ways it wasn't designed to be used. Next time you fearlessly buy something online, use your smartphone for mobile banking or even send a friend your address over email, thank a hacker.

Sources

"The abolition of privateering and the declaration of Paris," Internet Archive, http://archive.org/details/abolitionofpriva00staruoft

"If Hackers Didn't Exist, Governments Would Have to Invent Them," Molly Sauter, The Atlantic, July 5, 2012, http://www.theatlantic.com/technology/archive/2012/07/if-hackers-didnt-exist-governments-would-have-to-invent-them/259463/

"Certified Ethical Hacker," EC-Council, Courses, 2013, http://www.eccouncil.org/courses/certified_ethical_hacker.aspx

"Licensed Penetration Tester," EC-Council, Courses, 2013, http://www.eccouncil.org/courses/licensed_penetration_tester.aspx

"What is a Hacker?," Bruce Schneier, Schneier on Security, September 14, 2006, http://www.schneier.com/blog/archives/2006/09/what_is_a_hacke.html


About Author

Justin Boyle is a freelance writer and journalist in Austin, Texas.

Featured Schools

Refine School Matches
Hide filters
  • SUBJECT Clear All

    See More

  • DEGREE

    See More

  • PROGRAM TYPE

  • START TIME

    LOCATION
    Please enter valid US or Canada Zip.
            Results open in new window

            Searching Searching ...

            Matching School Ads
            Bachelor of Science in Information Technology - Security
            • Bachelor’s and master’s programs in Criminal Justice available
            • Ranked among the Best Online Graduate Criminal Justice Programs by U.S. News and World Report in 2017
            • Concentrations include Forensics, Homeland Security, and Cybercrime and Security
            • Students study law enforcement operations, corrections, and criminal investigation
            • Online Courses
            • Flexible Scheduling
            • Accelerated Programs
            • Financial Aid
            • Transferable Credits
            Bachelor of Science in Information Systems Technology - Information Security
            • Bachelor’s program options include Cybersecurity, Information Systems Technology, Computer Science, and more.
            • A BAS in Information Systems Technology is also available for students who already hold an A.A.S degree.
            • Regent University’s tech programs are designed to prepare students for careers in Software Development and Engineering, Computer Information Security, Network Administration, and more.
            • Regionally accredited by the Southern Association of Colleges and Schools Commission on Colleges (SACSCOC).
            • Online Courses
            Computer Science - Networking and Information Systems Security (BS)
            • Offers several scholarship opportunities for students who qualify.
            • Laptop computers are issued to each student at the beginning of their program.
            • Provides programs in health care, business, information technology, and graphic arts.
            • Respiratory Therapy program is accredited by the Commission on Accreditation for Respiratory Care (CoARC).
            • Accredited by the Accrediting Commission of Career Schools and Colleges (ACCSC).

            Our family of non-profit colleges admits students of any race, color, and national or ethnic origin.

            Show more [+]
            Master of Business Administration, MBA - Information Security Management
            • Has students attend one four-week class at a time and take their final exam before moving on to their next class.
            • Offers 24/7 online tech support, with a typical response time of 4 hours or less.
            • Has online help centers that offer assistance with writing, statistics, medical assisting, and more.
            • Provides job placement assistance to all its students and alumni.
            • Researches trends for growing fields to tailor a more effective curriculum.
            Show more [+]
            • Accredited
            • Online Courses
            • Flexible Scheduling
            • Financial Aid
            • Transferable Credits
            MS in Cyber Security
            • Liberty University’s online programs ranked in the top 10 out of more than 2,100 colleges & universities for academic quality, affordability, and accessibility.*
            • 100% online programs at associate, bachelor’s, master’s, and doctoral level.**
            • Transfer up to 90 credits into an undergraduate degree program.
            • Up to 50% of your master’s degree can be transferred in to help you get the most out of your hard work and maximize the credit you previously earned.
            Show more [+]
            • Accredited
            • Online Courses
            • Financial Aid
            • Transferable Credits
            Cybersecurity (Associate)

            50 Years of Excellence In Education

            Coleman University is a private non-profit teaching university founded in 1963 and located in San Diego, California. Its undergraduate and graduate programs prepare individuals for technology-focused careers and leadership. As San Diego’s oldest school dedicated to information technology, Coleman University has historically educated a large number of the region’s business-technology professionals.

             

            Master of Science in Cybersecurity
            • The M.S. in Cybersecurity provides the necessary foundations for the design and development of systems that are assured to be secure
            • Founded in 1901, the school has maintained its reputation as a leader in the field, offering a curriculum built on theory, fundamentals, and application with a worldwide community of over 20,000 engineering and computer science alumni
            • Syracuse University’s College of Engineering and Computer Science is designated by the National Security Agency and Department of Homeland Security as a Center of Academic Excellence in Information Assurance Education (CAEIAE) since 2001 and as a Center of Academic Excellence in Information Assurance Research (CAE-R) since 2009.
            • Designed and taught by Syracuse faculty, the curriculum built on theory, fundamentals, and application.
            Show more [+]
            • Online Courses