Questions 1-11 refer to the following information.
An Official, Certified… Criminal?
[1] The image is as old as computers themselves. [2] These are the hackers, immortalized in the 1995 cult classic film Hackers. [3] Of late, these “cybercriminals” have become the scourge of the American public 1in recent years because of huge security breaches at major businesses. [4] “Hackers” are the reason we password-protect our WiFi networks and feel a twinge of skepticism every time we pay for something with a credit card. [5] A ponytailed group of geeks, their computer monitors reflecting brightly off of their glasses, breaking into some “mainframe” from an evil corporation. 2
3While the popular image of the hacker might not have changed, it has, in some cases, been given a bit of a makeover. Schools like Hack Reactor in San Francisco teach aspiring software engineers and wear the name “Hack” proudly, as if it’s a sign of 4authenticity. In this line, a “hacker” is now seen as one whose powers can be used for good as well as ill. There is a new crop of hackers, called Certified Ethical Hackers (CEH), who can help to protect against 5our evil counterparts and make computers safer for us all.
Certified Ethical Hackers follow a course of study either at an Accredited Training Center or by self-study. The final exam is a 125 multiple-choice exam: it takes four hours and requires 70% correct to receive a passing score. There is another 6certification Certified Network Defense Architect which has the same basic course and test but is available only for certain U.S. Government agents. 7
CEHs combine many facets of computer study into 8one typically. A company will hire a CEH to ensure maximum security of that company’s network, whether that’s company secrets or customer payment information or anything in between. Essentially, an ethical hacker does everything that an unethical one does, but he or she does so at the request of a particular organization. “We want you to hack us,” says that organization, “so we 9will have known how to avoid being hacked.” It’s kind of like the old saying, “It takes a crook to catch a thief,” except in this case the “crook” is not a crook at all. 10
Some in the computing community disparage the term. They say that “hacker” is a criminal designation, so saying “ethical hacker” is like saying “ethical thief,” that is, a 11contradiction of terms. This objection is of course overstated, and overwhelmingly, companies are happy to have “hackers” on staff. That designation can help to overcome the stodgy, impersonal image that corporations tend to have, and it can tap in to a kind of underground energy that many find irresistible.