Can you take what you learn from network security and use it in a negative manner?
-
-
Answer:
If this were true the worldssecurity systems would be screwed to hell and back. Computer security is a little different than what a cop does. A cop doesnt become a thief to understand what he does or break into mock homes to "recommend" how to secure an area. A computer security specialist does. You learn all the tools and techniques a hacker would use to look for common and not so common vulnerabilities. You need to know how to break through a wifi network, seek out loopholes, exploit errors in order to see how far the daisy chain goes so you can then go back and plug up all the loopholes you found so when someone DOES eventually try they wont have much success. You dont just learn theory, but actual practice. SO to answer your questio, ahving the tools a hacker would use can they be misused? Well a gun can be sued for hunting but also for murder. You have the tools to secure a building, whether you use them to break into systems and steal info is up to the person.
Lelow at Yahoo! Answers Visit the source
Other answers
If this were true the worldssecurity systems would be screwed to hell and back. Computer security is a little different than what a cop does. A cop doesnt become a thief to understand what he does or break into mock homes to "recommend" how to secure an area. A computer security specialist does. You learn all the tools and techniques a hacker would use to look for common and not so common vulnerabilities. You need to know how to break through a wifi network, seek out loopholes, exploit errors in order to see how far the daisy chain goes so you can then go back and plug up all the loopholes you found so when someone DOES eventually try they wont have much success. You dont just learn theory, but actual practice. SO to answer your questio, ahving the tools a hacker would use can they be misused? Well a gun can be sued for hunting but also for murder. You have the tools to secure a building, whether you use them to break into systems and steal info is up to the person.
John
Related Q & A:
- What can I use to clean a DVD?Best solution by Yahoo! Answers
- What software i can use in making a video?except the movie maker?Best solution by Yahoo! Answers
- What college courses can I take to get an A.A. paralegal degree?Best solution by pennfoster.edu
- Can I take network marketing as my career?Best solution by Yahoo! Answers
- What can I take on a plane and what can't I?Best solution by Yahoo! Answers
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.