ETHICAL HACKERS: WHO THEY ARE AND WHY COMPANIES REWARD THEM

Abstract

In today's digital world, cybersecurity has become one of the most important issues. Despite firewalls, antiviruses and complex passwords, cybercriminals continue to find vulnerabilities. At this point, boot hackers  that is, "well-intentioned" hackers  come into the field.

Source type: Conferences
Years of coverage from 2022
inLibrary
Google Scholar
129-132
216

Downloads

Download data is not yet available.
To share
Baxromov, K. . (2025). ETHICAL HACKERS: WHO THEY ARE AND WHY COMPANIES REWARD THEM. Теоретические аспекты становления педагогических наук, 4(7), 129–132. Retrieved from https://www.inlibrary.uz/index.php/tafps/article/view/79448
Crossref
Сrossref
Scopus
Scopus

Abstract

In today's digital world, cybersecurity has become one of the most important issues. Despite firewalls, antiviruses and complex passwords, cybercriminals continue to find vulnerabilities. At this point, boot hackers  that is, "well-intentioned" hackers  come into the field.


background image

THEORETICAL ASPECTS IN THE FORMATION OF

PEDAGOGICAL SCIENCES

International scientific-online conference

129

ETHICAL HACKERS: WHO THEY ARE AND WHY

COMPANIES REWARD THEM

Komiljon Baxromov Muzaffar's son

Tashkent University of Information Technologies

student.

komiljonbakhromov@gmail.com

https://doi.org/10.5281/zenodo.15208625

In today's digital world, cybersecurity has become one of the most

important issues. Despite firewalls, antiviruses and complex passwords,
cybercriminals continue to find vulnerabilities. At this point, boot hackers that
is, "well-intentioned" hackers come into the field.

Hacker (English: hack - that is, to chop ̧ axe) is an exceptionally qualified

specialist in information technology. Someone who can disrupt systems. A
person with an extremely deep knowledge of computer systems. Jump to search
Hackers are mainly categorized into 3 types: Black hat, White hat, and Grey hat.

The word hack is groomed in hippie jargon and has entered the world's

vocabulary. The word hacker is now misused in the sense of cracker, which
means disruptor.

Hackers act according to their political sympathies and antipathies,

deliberately damaging computer programs. In the United States and Europe,
hacking qualifies as a cybercrime.

Hacking culture is a subculture of people who enjoy the intellectual

challenge of creatively overcoming the limitations of software systems or
electronic equipment (mainly digital electronics) in order to achieve new
results. The act of engaging in activities (such as programming or other media)
in the spirit of playfulness and exploration is called hacking. However, the
defining feature of a hacker is not the activity that takes place on its own (e.g.,
programming), but how it is carried out, how exciting it is, and how meaningful
it is. The activity of the playful mind can be said to have the value of "hacking".
For this reason, the term "hacking" was coined, and early examples of which
include jokes made by students at MIT to demonstrate their technical ability and
intelligence. Hacking culture originated in academia in the 1960s around the
Massachusetts Institute of Technology (MIT) Tech Model Railroad Club (TMRC)
and the MIT Artificial Intelligence Laboratory. Hacking initially involved
deliberate access to restricted areas without causing significant damage. Some
notorious hackers at the Massachusetts Institute of Technology were involved in
such activities as installing a campus police cruiser on the roof of the Great
Dome and converting the Great Dome into R2-D2.


background image

THEORETICAL ASPECTS IN THE FORMATION OF

PEDAGOGICAL SCIENCES

International scientific-online conference

130

When we think of a specific reason why hackers are attacking websites, we

can think they have a specific reason why they are targeting us as website
owners: our business, our reputation, or our information. The truth is that
although the victim is considered personal, hackers rarely choose specific
targets. Typically, hackers perform massive searches for specific vulnerabilities
and together focus on these sites.

Before we go into the psychology of website hacking, let's first group our

hackers according to their motivation.

The tech team, the white hats, try to find vulnerabilities without any

malicious intentions. These "hackers" can be anyone. The thing that
differentiates them from Black Hat Hackers is that they usually allow the target
hacker, and their goal is to improve website security online rather than exploit
it. White-cap hackers use extensive automation tools, processes, and knowledge
to identify vulnerabilities and, if necessary, proceed with a real vulnerability.
Businesses can rent their white hats to try out by implementing a cybersecurity
strategy.

Unlike white hat, this group is looking to exploit website weaknesses for

malicious purposes. Personal income is the name of the game for cybercriminals.
Black Hood hackers use the exact same technology, but gain access without
permission. They are not material and are not morally motivated. They try
malware scripts to write which allows them to use as many targets as possible.

Just like the white cap hackers, the gray cap hackers have good intentions,

but they also want a little fame. These people are more likely to apologize rather
than seek permission to access vulnerability systems, and are usually expected
to receive money in exchange for their findings. Firstly, they identify the danger,
and secondly, they report those responsible for what they find. They can hide
some of their findings in order to encourage the company to pay. Technically it is
illegal. They first require permission from the website owner

Anyone who hacks a target thinking they can prove something or reveal a

subject to the world are called hackers. Their goal is to gain unauthorized access
to websites to raise awareness of political, religious or social issues. These
efforts are extreme: from denial-of-service (DDoS) attacks to the Domain Name
Service (DNS) intercepting social change messages and bulk emails. These
attacks are usually in the form of waves with the aim of drawing attention to the
subject. Targets can range from entire governments and industries to specific
companies and people.


background image

THEORETICAL ASPECTS IN THE FORMATION OF

PEDAGOGICAL SCIENCES

International scientific-online conference

131

Script kiddie is a term used in the cybersecurity world to mock hackers who

don't write their software. These hackers are mostly amateurs who are
considered children or teenagers who don't know what they're doing. In fact,
they can exist at any age. What they have in common is that they may use
existing programs, bundles, or scripts and don't understand their impact at all.

Not understanding the consequences of randomly running scripts on the IP

block makes them dangerous, but it also makes them easier to grasp. What
motivates kids to script is attention, prestige, curiosity, and sometimes boredom.

Ethical hackers are IT professionals who use permission-based hacking

techniques to identify vulnerabilities in systems, applications, or networks.
Their goal is not to damage the system, but to protect it.

Based on the vulnerabilities they found, companies are stepping up their

security measures Why do companies reward them?

Many large companies and organizations have established "bug bounty"

programs. Through these programs, they offer a cash reward or other incentive
to boot hackers for every vulnerability they find. The reasons are as follows:

Identifying unexpected vulnerabilities: An internal security team

sometimes can't see all the vulnerabilities, while boot hackers identify problems
with a new approach.

Reduce costs: If a vulnerability goes undetected and is exploited by a real

hacker, a company can suffer massive damage. And with boot hacks, this risk is
eliminated in advance.

Public engagement: By engaging ethical hackers, companies build positive

relationships with the tech community.

What are the activities of boot hackers?
1. Tests will be conducted on systems or applications that the Company has

authorized.

2. If a vulnerability is discovered, the company will be notified.
3. The company will verify and clarify this notice.
4. If the vulnerability is confirmed, the boot hacker will be encouraged.
In conclusion, Ethical hackers are fulfilling the role of "digital guardians" in

the modern digital world. They play an important role in protecting users,
companies, and even society from cyber threats by finding flaws in security
systems. Companies, on the other hand, appreciate this service and are trying to
strengthen their security by incentivizing them.

References:

1. Andress, J., & Winterfeld, S. (2013). Cyber Warfare: Techniques, Tactics and
Tools for Security Practitioners. Elsevier.


background image

THEORETICAL ASPECTS IN THE FORMATION OF

PEDAGOGICAL SCIENCES

International scientific-online conference

132

2. Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems
Security. Jones & Bartlett Publishers.
3. EC-Council. (2020). Certified Ethical Hacker (CEH) Study Guide.
4. Skoudis, E., & Liston, T. (2006). Counter Hack Reloaded: A Step-by-Step Guide
to Computer Attacks and Effective Defenses. Prentice Hall.

References

Andress, J., & Winterfeld, S. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Elsevier.

Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Publishers.

EC-Council. (2020). Certified Ethical Hacker (CEH) Study Guide.

Skoudis, E., & Liston, T. (2006). Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses. Prentice Hall.