Menu
Theme
Bachelor of Science in Computer Science
Course Content

Ethical Hacking

Computer Security

Karibu! Welcome to the World of Digital Detectives!

Habari ya leo, future tech champion! Imagine you are a security guard, an askari, for a big company like Safaricom or KCB Bank. Your job is to walk around, check all the doors, windows, and gates to make sure no thieves (wezi) can get in. You're not trying to steal anything; you're trying to find the weak spots before the real thieves do, so you can fix them!

That is exactly what an Ethical Hacker does, but in the digital world of computers, websites, and apps like M-Pesa. You become a "digital askari" who helps keep our online world safe!

Image Suggestion: A vibrant, colourful illustration of a young Kenyan student, wearing a cool hoodie with a circuit board pattern, sitting in front of a laptop. The screen shows lines of code and a shield icon. In the background, a modern Nairobi skyline is visible. The student looks focused and heroic, like a digital superhero.

So, What is Ethical Hacking, Really?

Ethical Hacking, also known as "White Hat" hacking, is the art of testing a computer system, network, or application to find security weaknesses that a malicious hacker could exploit. The most important word here is PERMISSION. An ethical hacker always has permission from the owner of the system before they start testing. They are the good guys!

The Three Hats of Hacking

In the world of computer security, we often talk about different "hats" to describe a hacker's intentions. It's like a movie with heroes, villains, and characters who are a bit of both!

  • White Hat Hacker: This is our hero! The Ethical Hacker. They are hired by companies to legally test their security. Their goal is to make things safer for everyone.
  • Black Hat Hacker: This is the villain. They break into systems without permission to steal information (like bank details or M-Pesa PINs), cause damage, or just create chaos. This is highly illegal!
  • Grey Hat Hacker: This person is in the middle. They might find a security problem without permission, but instead of causing harm, they might tell the company about it. However, breaking into a system without permission is still illegal, even if you have good intentions.

Why is This Important for Us in Kenya?

Think about how much we rely on technology every day. We use our phones and computers for so many things!

Real-World Scenario: Imagine a new online shop, "ChapChap Deliveries," starts in Nairobi. They hire a young ethical hacker named Amina. Amina's job is to pretend to be a bad hacker and try to break into their website. She discovers a small mistake that could let someone see all the customer addresses and phone numbers! She immediately reports this to the ChapChap team. They fix the problem before any real hacker finds it. Amina just protected the private information of thousands of Kenyans! That's the power of ethical hacking.

Ethical hackers are crucial for protecting services like:

  • M-Pesa: They help Safaricom make sure nobody can steal money from your account.
  • eCitizen: They test the system to ensure your personal data, like your ID number and KRA PIN, is kept private and safe.
  • Online Banking (KCB, Equity, etc.): They prevent bad hackers from accessing your bank account online.

A Peek Inside the Digital Toolkit

Ethical hackers use special tools to test systems. Let's look at a very simple but useful one called ping. It's like shouting "Uko hapo?" ("Are you there?") across a field to see if your friend can hear you. In networking, ping sends a small packet of data to a server to see if it's online and how quickly it responds.


C:\Users\Student> ping google.com

Pinging google.com [142.250.183.78] with 32 bytes of data:
Reply from 142.250.183.78: bytes=32 time=15ms TTL=116
Reply from 142.250.183.78: bytes=32 time=14ms TTL=116

Ping statistics for 142.250.183.78:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milliseconds:
    Minimum = 14ms, Maximum = 15ms, Average = 14ms

This tells us the server is online ("Received = 2") and responds very quickly (average of 14 milliseconds)!

The Math Behind a Strong Password

Why are you always told to use long and complex passwords? Let's do some simple math. Your M-Pesa PIN is 4 digits long. Each digit can be any number from 0 to 9 (10 possibilities).


Formula: Total Combinations = (Number of Options for each position) ^ (Length of PIN)

For an M-Pesa PIN:
Number of Options = 10 (the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9)
Length of PIN = 4

Total Combinations = 10 * 10 * 10 * 10 
                 = 10^4
                 = 10,000

A computer can try all 10,000 combinations very fast!

Now, imagine a password that is 8 characters long and uses uppercase letters (26), lowercase letters (26), numbers (10), and symbols (let's say 10). The number of options becomes 26 + 26 + 10 + 10 = 72. The total combinations would be 72^8, which is a HUGE number! That's why complexity matters.

Building Digital Walls (Firewalls)

A firewall is a security device that acts like a gatekeeper for your computer network. It stands between your computer and the internet, monitoring all the traffic coming in and out, and blocking anything that looks suspicious. Think of it as the main gate to a school with a very strict askari!


        +----------------+                 +----------------+
        |                |                 |                |
        | Your Computer  | <-- Safe -->  |   FIREWALL   | <-- Danger? --> | The Internet |
        |    (Inside)    |                 | (The Askari) |                 |    (Outside)   |
        |                |                 |                |                 |                |
        +----------------+                 +----------------+                 +----------------+
                                                 ^
                                                 |
                                         Blocks Bad Traffic
                                         (like viruses & hackers)

Your Mission: Be a Force for Good!

You are now on the path to becoming a digital defender! This field is all about curiosity, problem-solving, and a strong sense of right and wrong. As you continue your journey in computer security, always remember the golden rule.

The Golden Rule of Ethical Hacking: You must NEVER test a system, website, or network without clear, written permission from the owner. Anything else is illegal and harmful.

Keep learning, stay curious, and use your skills to build a safer digital Kenya for everyone!

Pro Tip

Take your own short notes while going through the topics.

Previous Firewalls
KenyaEdu
Add KenyaEdu to Home Screen
For offline access and faster experience