Ethical hacking: Meet the James Bond of cyberspace!

Ethical hacking: Meet the James Bond of cyberspace!

Edited By Rashmi Menon | Updated on Feb 10, 2014 11:12 AM IST

ETHICAL HACKING presents plenty of challengesbas new technologies evolve and updating onself is a must to survive

A little help from 24-year-old Sunny Vaghela goes a long way in helping the Ahmedabad police during investigations. It all began with an MMS case at his university where he was a third-year engineering student. “The university and police approached me to find the student who uploaded the video on a social media website where he had created a fake ID,” recalls Sunny, now Founder and Chief Technical Officer of TechDefence Consulting, which routinely assists in investigations involving cybercrime, a growing menace.

Ethical hacking: Meet the James Bond of cyberspace!
Ethical hacking: Meet the James Bond of cyberspace!


Fighting cybercrime
The recent password thefts at Yahoo and LinkedIn are examples of cybercrime on a global scale. Closer home, our own government’s website was disfigured as well as that of several politicians. Computer Emergency Response Team – India (CERT-IN), a government nodal agency, acknowledges that even popular consumer programmes and browsers are vulnerable to hacker attacks. With more people and organisations becoming digitally savvy, information and data security is slowly but surely emerging as a lucrative career option. However, there is a shortage of trained professionals in this field.

Ethical hacking is legal
It is not a surprise that this breed is viewed with suspicion as the media has sufficiently highlighted the exploits of malevolent hackers. However, ethical hackers take prior permission from companies, organisations or individuals, and use their skills and knowledge of technology to expose loopholes and vulnerabilities in digital data and systems. They recommend solutions and submit reports, explains Sunny, who points out that ethical hacking is legally recognised. Further more, hacking is often referred to as “penetration testing”.

bios-team

INTERNATIONAL HACKATHON The BIOS team from Amrita Vishwa Vidyapeetham recently attended an event by forum Positive Hack Days or PHD in Moscow

What ethical hackers do
The role of ethical hackers or Information Security Experts (as they are called in India) is to protect data and track unauthorised or malicious hackers, especially in sectors like IT, police services, defence, insurance and banking. “An ethical hacker usually focuses on one IT domain such as networking, operating system or cloud computing, and becomes an expert,” says Sangeet Chopra, Chief Technical Head at Cybercure Technologies. If a system is hacked into, ethical hackers resort to tests such as vulnerability assessment testing, application penetration testing, network penetration testing, security analysis, reverse engineering, malware analysis, security auditing, and also security management.

Good guys versus bad guys
“The hacker is the cyber James Bond, saving the system from malicious hackers who are trying to use their superior knowledge for illegitimate gains,” analogises Yogesh L, member of Random Hacks of Kindness (RHoK), an international community of professionals, which refers to its members as innovators and uses technology to create usable technology solutions for real-world problems. Besides security, ethical hackers can also help in creating new applications from the existing technology that could find its way to end users.

A knack to hack
Chopra, Sunny and Bangalore-based IT-professional Dolly Koshy got interested in the field during their school days. “My parents locked the computer with a password because exams were near. Since I wanted to check a social media site I had to crack into the system. Eventually, I hacked into it and got access to my computer,” recalls Chopra.

Getting certified
All ethical hackers are not engineers. Chopra did a BSc before taking up ethical hacking as a profession. But how important is a certification in this field? Chopra shares that many professional information security consultants believe that certification is not necessary to take up ethical hacking as a profession, though technical knowledge is imperative. On the other hand, a certification adds weight to your résumé, feels Vaghela. EC-Council, an international body is authorised to provide certified ethical hacker (ECH) certification.

Employment options

  • IT companies

  • Companies handling sensitive data

  • Online media companies

  • Social media/e-mail/online networking

  • companies

  • Entrepreneurship

Hacking statistics

  • Security incidents handled – 13301 (2011); 23 (2004)

  • Indian website defacement tracked – 17306 (2011)

  • Website compromise and malware propagation – 4394 (2011); 835 (2008)

  • Virus and malicious code – 2765 (2011);408 (2008)

Source: CERT-IN

Sunny-Vaghela


Sunny Vaghela
Certified ethical hacker,

Founder & CTO of TechDefence Consulting

“In this field every day is a new challenge”

Q. Hackers get into the profession young. What about you?

A. I got curious in Class 9 when my e-mail account got hacked into. I began to explore but did not know there was potential for a career. So, I did Electronics Engineering but continue to myself by doing new courses.

Q. So. How do you do ethical hacking for a client?

A. There are essentially two types of penetration testing (alternative name for hacking). One, white box testing, where the clients gives me privileges that the company’s system administrator would get. I receive all passwords of firewall and other security softwares, and need to check if these are safeguarded enough. Two, black box testing where the company does not give me access or reveal passwords.

I only have the IP address through which I hack into the company’s system. Then I identify vulnerabilities in the security system and exploit them, then give a detailed report on how I managed to hack in and what steps needs to be taken to resolve the security lapses. Black box testing is more in demand because companies need not divulge any info to us, that is, third party vendors. So, ask for black box testing first, then conduct white box testing to detect any coding errors. Companies often ask ethical hackers to train their employees so that they can handle and analyse any attacks in-house when updating their technology in future.

Q. What do you like about this profession?

A. I enjoy solving new challenges, and in spite of being a certified ethical hacker, I am constantly learning new things.

Expanding your skills
The Hyderabad-based Entersoft Information Systems is one of EC-Council’s accredited centres in the country. Nithyanand, co-founder of Entersoft, believes that having programming knowledge in C/C++ would prove to be advantageous in getting a better grasp of the course. IIIT- Allahabad provides a two-year MS degree in cyber law and information security. “The course teaches students about information security and the legal implications in it,” says Sunny, who conducts Certified Cyber Security Expert (CCSE) course.

In this field, practical knowledge is a must and certified courses have virtual labs. Here students are allowed to perform all kinds of experiments on fake websites. Dolly, nearly at the end of her 40-hour Certified Information Security Expert (CISE) course (Level 1), is learning how to prevent possible hack-attacks in her computer system but also to protect her system once it is hacked. “I have come to realise how vulnerable you are on the Internet,” she says.

Cyber forensics
An upcoming vertical, the main purpose here is to crack into computer hardware, e-mails and other digital databases to retrieve data and establish evidence and digital signatures in criminal investigations. The government has made it mandatory to have cyber forensic reports submitted in any investigation.

Cell phone penetration
Smartphones have enabled several new uses through the concept of mobile apps, which are connected to the Internet. Many don’t realise the need to protect their cellphones with anti-viruses as they do for their laptop or PC. “These applications may have loopholes that can be compromised when installed,” says Nithyanand. Hacking techniques like SIM cloning or caller ID spoofing are used to hack into a known number from anywhere in the world and call you. “To overcome this problem, penetration testing must be done when the application is developed. Besides this, we can analyse a log on, how and when the phone was hacked based on forensics,” he adds.

Hackaday-winners-Bhavana-(L)-and-Reena

“Learning new

technologies is our passion and hacking is a nice way to learn new ones. It felt great to demonstrate our applications to the judges. They were very impressed looking at the demo and their feedback made us feel really delighted”

Bhavana Sardana
Computer Scientist, Adobe and winner of SlideShare-LinkedIn DevelopHer Hackaday event

A collaborative profession
RHoK, an international community of hackers that pool in their resources to collaborate on world-scale projects, has been organising weekend hackathons since 2010 in India where expert ethical hackers are invited. An eBlood bank was an outcome of one of them.

Hackathon mania!
Corporates like AT&T, Google, Microsoft, Yahoo! and SlideShare, online hacker communities and universities routinely host ‘hackathons’, events where students and professionals can showcase their prowess and skills, network, win prizes and even find potential employers! Usually teams are asked to hack into the company’s software and create innovative technology.

Campus buzz
Amrita University, Coimbatore, has been holding hackathons for students since the last two years, and will be hosting CTF (Capture the Flag style of ethical hacking) in the future. Teams will be given vulnerable machines, where they have to identify loopholes, fix them and capture the flags in other vulnerable machines. Teams who do this successfully, are awarded points. Sheshagiri Prabhu, organiser and member of Team BIOS, feels that more universities should host hackathons, as hands-on experience is the best way to learn computer security and for students to enter the software industry. “Security and secure coding is a must in today’s world,” he says. Team BIOS has been actively participating in international hackathon contests, like the one by international forum Positive Hack Days in Moscow.

Women hackers
Recently, SlideShare (acquired by LinkedIn a few months ago), held its first hackathon exclusively for women hackers and programmers in the US and Delhi simultaneously. The organisers were pleasantly surprised to find eight teams of two each participating and all made innovative presentations at the end of the event. Adobe employees Bhavana Sardana, a computer scientist with the print technologies department and Reena Agrawal who works the InDesign, won the event in Delhi for developing Fixcity, a hack on live traffic conditions using Google Maps to improve the world during the daily drive to work. “We used Dreamweaver, Phonegap and Eclipse to develop the app,” says Bhavana.

lady-hackers

LADY HACKERS India's first all-women event Developher Hackday Linkedln inDelhi

Networking with recruiters
“There are many women developers in Bangalore and Hyderabad but we haven’t noticed many in Delhi. We thought this might encourage more women in technology,” explains Priyanka Rowthu, Asst Manager-Recruitment, SlideShare. In turn, it helps the organisers in recruiting skilled participants. “Apart from a strong academic record, having a technical blog or showcasing interest in technology gives the candidate an edge, during recruitment,” shares Priyanka.

Pay scales
Unlike other industries, the pay scale in this field entirely depends on your knowledge, skills and initiative. According to Nityanand, Rs. 2-3 lakhs per annum is the pay package for freshers. However, Rajat Garg of Cybercure Technologies says depending on the projects, an ethical hacker can earn about Rs. 5-10 lakhs.

Stay ahead of the bad guys
“Constantly your knowledge as soon as the technology updates itself. If you stop learning, your knowledge will be obsolete in no time,” Sunny advises.

Institutes and courses

Department of Criminology, University of Madras MSc in Cyber Forensics and Information Security (Eligibility: Graduates in Comp Applications, Computer Science or IT, forensic, criminology or law); Diploma in Cyber Crime and Information Security

Gujarat Forensic Science University – MS Digital Forensics and Information Assurance (Computer Science or BE (computer/IT) or B.Tech); Certified Cyber Crime Investigator, Certified Cellphone Forensic professional, Certified Computer Forensic expert, Certified Cyber Security expert; PG Certificate Diploma in Cyber law

KJ Somaiya Institute of Management Studies and Research, Mumbai - PG Programme in Information Security Management

IGNOU – PG Diploma in Information Security;PG Certification in Information Security

IIIT Allahabad – MS Cyber Law and Information Security

Entersoft Information Systems, Hyderabad – Certified Ethical Hacker (CEH) certification and training course; Fee: Rs 35,000 (students get 10-15 percent discount); No Distance learning.

TechDefence Consulting, Ahmedabad - Certified Cyber Security Expert (CCSE); Fee: Rs 12,000; No distance learning Cybercure Technologies, Delhi – Workshop on ethical hacking for corporate companies and engineering colleges in Certified Information Security Specialist

Cisco Networking Academy in 22 states offer a course in Security & Wireless LAN

CISCO’s ISS Certification (Internet Security System) - Design and implementation of security systems (course architecture by IIIT Hyderabad)

CDAC, Mohali - workshops on Computer Inter networking, Network Security (practicing and aspiring networking professionals with a degree/diploma/graduates with one-year work experience in IT)

CDAC Hyderabad - Certificate in Network and Systems Security

CISAT (Centre for Information Security & Assurance Technologies) – In-house security awareness courses along with network security through collaboration with Network Associates’ Sniffer University

Manipal University - Certificate in Ethical Hacking and Information Security

INNOBUZZ Knowledge Solutions, Delhi - CISE: Diploma in Ethical Hacking


Articles

Certifications By Top Providers

Explore Top Universities Across Globe

University of Essex, Colchester
 Wivenhoe Park Colchester CO4 3SQ
Anglia Ruskin University, Cambridge
 East Road, Cambridge Cambridgeshire 1 1PT
Georgia Institute of Technology, Atlanta
 North Avenue, Atlanta, Georgia 30332
University College London, London
 Gower Street, London, WC1E 6BT
Brunel University, London
 Kingston Lane Uxbridge Middlesex UB8 3PH
Kingston University, London
 River House, 53–57 High Street, Kingston upon Thames, Surrey KT1 1LQ
Get answers from students and experts
Data Administrator

Database professionals use software to store and organise data such as financial information, and customer shipping records. Individuals who opt for a career as data administrators ensure that data is available for users and secured from unauthorised sales. DB administrators may work in various types of industries. It may involve computer systems design, service firms, insurance companies, banks and hospitals.

4 Jobs Available
Bio Medical Engineer

The field of biomedical engineering opens up a universe of expert chances. An Individual in the biomedical engineering career path work in the field of engineering as well as medicine, in order to find out solutions to common problems of the two fields. The biomedical engineering job opportunities are to collaborate with doctors and researchers to develop medical systems, equipment, or devices that can solve clinical problems. Here we will be discussing jobs after biomedical engineering, how to get a job in biomedical engineering, biomedical engineering scope, and salary. 

4 Jobs Available
Ethical Hacker

A career as ethical hacker involves various challenges and provides lucrative opportunities in the digital era where every giant business and startup owns its cyberspace on the world wide web. Individuals in the ethical hacker career path try to find the vulnerabilities in the cyber system to get its authority. If he or she succeeds in it then he or she gets its illegal authority. Individuals in the ethical hacker career path then steal information or delete the file that could affect the business, functioning, or services of the organization.

3 Jobs Available
GIS Expert

GIS officer work on various GIS software to conduct a study and gather spatial and non-spatial information. GIS experts update the GIS data and maintain it. The databases include aerial or satellite imagery, latitudinal and longitudinal coordinates, and manually digitized images of maps. In a career as GIS expert, one is responsible for creating online and mobile maps.

3 Jobs Available
Data Analyst

The invention of the database has given fresh breath to the people involved in the data analytics career path. Analysis refers to splitting up a whole into its individual components for individual analysis. Data analysis is a method through which raw data are processed and transformed into information that would be beneficial for user strategic thinking.

Data are collected and examined to respond to questions, evaluate hypotheses or contradict theories. It is a tool for analyzing, transforming, modeling, and arranging data with useful knowledge, to assist in decision-making and methods, encompassing various strategies, and is used in different fields of business, research, and social science.

3 Jobs Available
Geothermal Engineer

Individuals who opt for a career as geothermal engineers are the professionals involved in the processing of geothermal energy. The responsibilities of geothermal engineers may vary depending on the workplace location. Those who work in fields design facilities to process and distribute geothermal energy. They oversee the functioning of machinery used in the field.

3 Jobs Available
Database Architect

If you are intrigued by the programming world and are interested in developing communications networks then a career as database architect may be a good option for you. Data architect roles and responsibilities include building design models for data communication networks. Wide Area Networks (WANs), local area networks (LANs), and intranets are included in the database networks. It is expected that database architects will have in-depth knowledge of a company's business to develop a network to fulfil the requirements of the organisation. Stay tuned as we look at the larger picture and give you more information on what is db architecture, why you should pursue database architecture, what to expect from such a degree and what your job opportunities will be after graduation. Here, we will be discussing how to become a data architect. Students can visit NIT Trichy, IIT Kharagpur, JMI New Delhi

3 Jobs Available
Remote Sensing Technician

Individuals who opt for a career as a remote sensing technician possess unique personalities. Remote sensing analysts seem to be rational human beings, they are strong, independent, persistent, sincere, realistic and resourceful. Some of them are analytical as well, which means they are intelligent, introspective and inquisitive. 

Remote sensing scientists use remote sensing technology to support scientists in fields such as community planning, flight planning or the management of natural resources. Analysing data collected from aircraft, satellites or ground-based platforms using statistical analysis software, image analysis software or Geographic Information Systems (GIS) is a significant part of their work. Do you want to learn how to become remote sensing technician? There's no need to be concerned; we've devised a simple remote sensing technician career path for you. Scroll through the pages and read.

3 Jobs Available
QA Manager

A Quality Assurance (QA) Manager, synonymous with a Quality Assurance Manager, holds a pivotal role in ensuring products meet predefined standards. Responsible for planning, directing, and formulating control policies, the QA Manager safeguards company efficiency and profitability. By scrutinizing products for flaws and ensuring compliance with internal and external requirements, they uphold quality, validating the effectiveness of quality assurance teams in maintaining high standards before product release.

4 Jobs Available
Azure Administrator

An Azure Administrator is a professional responsible for implementing, managing, and monitoring identity, governance, storage, compute as well as virtual networks in a cloud environment. The role of Azure Administrator comes with the responsibility of serving in a larger team dedicated to the implementation of cloud infrastructure in an organisation. 

Azure Administrator utilises Microsoft Azure. Microsoft Azure is a cloud computing platform. It lets users manage a variety of cloud resources and services such as data storage, data transformation, and others. An Azure Administrator job involves ensuring data backups for restoration. He or she must have expertise in managing public and private IP addresses concerning virtual machines and Azure resources.

4 Jobs Available
AWS Solution Architect

An AWS Solution Architect is someone who specializes in developing and implementing cloud computing systems. He or she has a good understanding of the various aspects of cloud computing and can confidently deploy and manage their systems. He or she troubleshoots the issues and evaluates the risk from the third party. 

4 Jobs Available
Product Manager

A product manager is a professional who determines what a product should do and how it should look like. A product manager analyses customer needs and combines them with company goals to develop a product that satisfies everyone. He or she works in coordination with different departments like engineers, salespersons, and product designers to ensure everyone works towards achieving the company's goals.

A product manager develops strategies and plans to help the employees work towards a common goal that is to develop a product that the customers demand. He or she plays the role of the first point of contact in the organisation for anyone who needs to know about the product. Concerning larger programmes, they work with Technical Program Managers to deliver results.

3 Jobs Available
Information Security Manager

Individuals in the information security manager career path involves in overseeing and controlling all aspects of computer security. The IT security manager job description includes planning and carrying out security measures to protect the business data and information from corruption, theft, unauthorised access, and deliberate attack 

3 Jobs Available
ITSM Manager

The ITSM Manager ensures adherence to ITIL standards and best practices within the IT services organization. As the owner of ITIL processes, they create, train, track, and report on these processes. Operating across IT functional areas, the ITSM Manager ensures alignment with business needs, implementing and continually improving service management policies and processes for optimal efficiency and effectiveness.

3 Jobs Available
Computer Programmer

A computer programmer is a specialist in one computer programming field, or he or she can write code for software of several kinds. Individuals in the computer programmer career path explain the procedure of developing, writing, reviewing, debugging and managing computer program source code. Within a programming language, this source code is composed so that the computer can understand it. 

The computer programmer career path starts with a strong interest in technology and with utter curiosity about programming languages. Students can pursue Computer Science courses to opt for a computer programmer career path. Here, in this article, we will discuss the details of a computer programmer career path, such as how to become a computer programmer in India, and scope of computer programming in India.

3 Jobs Available
RPA Developer

An RPA Developer is an expert who is responsible for developing software technology to build, deploy and manage RPA machines and systems. He or she deals with the process of automating complex and redundant business tasks using Artificial Intelligence and Machine Learning algorithms.

An RPA Developer is required to investigate, analyse and organise automated processes to increase the efficiency of a business model using RPA technologies and tools. He or she possesses the skills of a Software Developer, Business Analyst and Project Manager. An RPA Developer is expected to perform coding, testing, and maintaining RPA bots and the entire ecosystem.

2 Jobs Available
Back to top