THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
129
ETHICAL HACKERS: WHO THEY ARE AND WHY
COMPANIES REWARD THEM
Komiljon Baxromov Muzaffar's son
Tashkent University of Information Technologies
student.
https://doi.org/10.5281/zenodo.15208625
In today's digital world, cybersecurity has become one of the most
important issues. Despite firewalls, antiviruses and complex passwords,
cybercriminals continue to find vulnerabilities. At this point, boot hackers that
is, "well-intentioned" hackers come into the field.
Hacker (English: hack - that is, to chop ̧ axe) is an exceptionally qualified
specialist in information technology. Someone who can disrupt systems. A
person with an extremely deep knowledge of computer systems. Jump to search
Hackers are mainly categorized into 3 types: Black hat, White hat, and Grey hat.
The word hack is groomed in hippie jargon and has entered the world's
vocabulary. The word hacker is now misused in the sense of cracker, which
means disruptor.
Hackers act according to their political sympathies and antipathies,
deliberately damaging computer programs. In the United States and Europe,
hacking qualifies as a cybercrime.
Hacking culture is a subculture of people who enjoy the intellectual
challenge of creatively overcoming the limitations of software systems or
electronic equipment (mainly digital electronics) in order to achieve new
results. The act of engaging in activities (such as programming or other media)
in the spirit of playfulness and exploration is called hacking. However, the
defining feature of a hacker is not the activity that takes place on its own (e.g.,
programming), but how it is carried out, how exciting it is, and how meaningful
it is. The activity of the playful mind can be said to have the value of "hacking".
For this reason, the term "hacking" was coined, and early examples of which
include jokes made by students at MIT to demonstrate their technical ability and
intelligence. Hacking culture originated in academia in the 1960s around the
Massachusetts Institute of Technology (MIT) Tech Model Railroad Club (TMRC)
and the MIT Artificial Intelligence Laboratory. Hacking initially involved
deliberate access to restricted areas without causing significant damage. Some
notorious hackers at the Massachusetts Institute of Technology were involved in
such activities as installing a campus police cruiser on the roof of the Great
Dome and converting the Great Dome into R2-D2.
THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
130
When we think of a specific reason why hackers are attacking websites, we
can think they have a specific reason why they are targeting us as website
owners: our business, our reputation, or our information. The truth is that
although the victim is considered personal, hackers rarely choose specific
targets. Typically, hackers perform massive searches for specific vulnerabilities
and together focus on these sites.
Before we go into the psychology of website hacking, let's first group our
hackers according to their motivation.
The tech team, the white hats, try to find vulnerabilities without any
malicious intentions. These "hackers" can be anyone. The thing that
differentiates them from Black Hat Hackers is that they usually allow the target
hacker, and their goal is to improve website security online rather than exploit
it. White-cap hackers use extensive automation tools, processes, and knowledge
to identify vulnerabilities and, if necessary, proceed with a real vulnerability.
Businesses can rent their white hats to try out by implementing a cybersecurity
strategy.
Unlike white hat, this group is looking to exploit website weaknesses for
malicious purposes. Personal income is the name of the game for cybercriminals.
Black Hood hackers use the exact same technology, but gain access without
permission. They are not material and are not morally motivated. They try
malware scripts to write which allows them to use as many targets as possible.
Just like the white cap hackers, the gray cap hackers have good intentions,
but they also want a little fame. These people are more likely to apologize rather
than seek permission to access vulnerability systems, and are usually expected
to receive money in exchange for their findings. Firstly, they identify the danger,
and secondly, they report those responsible for what they find. They can hide
some of their findings in order to encourage the company to pay. Technically it is
illegal. They first require permission from the website owner
Anyone who hacks a target thinking they can prove something or reveal a
subject to the world are called hackers. Their goal is to gain unauthorized access
to websites to raise awareness of political, religious or social issues. These
efforts are extreme: from denial-of-service (DDoS) attacks to the Domain Name
Service (DNS) intercepting social change messages and bulk emails. These
attacks are usually in the form of waves with the aim of drawing attention to the
subject. Targets can range from entire governments and industries to specific
companies and people.
THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
131
Script kiddie is a term used in the cybersecurity world to mock hackers who
don't write their software. These hackers are mostly amateurs who are
considered children or teenagers who don't know what they're doing. In fact,
they can exist at any age. What they have in common is that they may use
existing programs, bundles, or scripts and don't understand their impact at all.
Not understanding the consequences of randomly running scripts on the IP
block makes them dangerous, but it also makes them easier to grasp. What
motivates kids to script is attention, prestige, curiosity, and sometimes boredom.
Ethical hackers are IT professionals who use permission-based hacking
techniques to identify vulnerabilities in systems, applications, or networks.
Their goal is not to damage the system, but to protect it.
Based on the vulnerabilities they found, companies are stepping up their
security measures Why do companies reward them?
Many large companies and organizations have established "bug bounty"
programs. Through these programs, they offer a cash reward or other incentive
to boot hackers for every vulnerability they find. The reasons are as follows:
Identifying unexpected vulnerabilities: An internal security team
sometimes can't see all the vulnerabilities, while boot hackers identify problems
with a new approach.
Reduce costs: If a vulnerability goes undetected and is exploited by a real
hacker, a company can suffer massive damage. And with boot hacks, this risk is
eliminated in advance.
Public engagement: By engaging ethical hackers, companies build positive
relationships with the tech community.
What are the activities of boot hackers?
1. Tests will be conducted on systems or applications that the Company has
authorized.
2. If a vulnerability is discovered, the company will be notified.
3. The company will verify and clarify this notice.
4. If the vulnerability is confirmed, the boot hacker will be encouraged.
In conclusion, Ethical hackers are fulfilling the role of "digital guardians" in
the modern digital world. They play an important role in protecting users,
companies, and even society from cyber threats by finding flaws in security
systems. Companies, on the other hand, appreciate this service and are trying to
strengthen their security by incentivizing them.
References:
1. Andress, J., & Winterfeld, S. (2013). Cyber Warfare: Techniques, Tactics and
Tools for Security Practitioners. Elsevier.
THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
132
2. Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems
Security. Jones & Bartlett Publishers.
3. EC-Council. (2020). Certified Ethical Hacker (CEH) Study Guide.
4. Skoudis, E., & Liston, T. (2006). Counter Hack Reloaded: A Step-by-Step Guide
to Computer Attacks and Effective Defenses. Prentice Hall.
