
Hackers for all
It will have happened to everyone, wandering through the posts published in the various social networks, to observe photographs of garbage abandoned in the most unthinkable places in the most peripheral areas of various Italian towns. The most striking thing is that, often, these small towns have a great tourist value, and this kind of urban and landscape degradation has heavy economic consequences.
Yet, there would be solutions that the world of Coding and Computing could alleviate or, even, solve.
Let’s go step by step and talk about : Ethical Hacking, beginning by describing who is an Ethical Hacker .
Who is the ethical hacker and what does he or she do
Who is the Hacker?
Often confused with malicious attackers on the Web, the hacker is a computer security expert figure who looks for weaknesses in the network infrastructure, software, and general defenses of a company with which he or she works, to prevent cyber criminals (or crackers) from finding the weaknesses.
In short, by the term hacker we do not denote web criminals.
On the contrary, the real meaning of hacker or ethical hacker is related to the cybersecurity specialist who has to find how many and what are the security flaws in a company’s network. Not only that, the search for vulnerabilities also extends into web-based software and websites.
Typically, ethical hackers are professionals with decades of experience in operational computer security.
The specialist usually works with clients from different industries but who have a common goal: the protection of the corporate network and data.
What are the tasks of the ethical hacker?
So we have specified that the task of the ethical hacker is to monitor the security level of a computer system or web infrastructure specified by the client. But how is this monitoring activity carried out?
In order to detect the presence of security holes or computer vulnerabilities, the ethical hacker uses advanced techniques (both automatic and manual).
The top services provided by an ethical hacker always include: Vulnerability Assessment and Penetration Testing.
It is penetration testing activity when indicating the simulated cyber attack service.
The pentest or penetration test means the active and passive analysis of the computer system to detect a weakness, technical flaw or vulnerability such that the computer system can be accessed. Normally, the presence of vulnerabilities can be attributed to the design, implementation or management of the system. The fact is that the presence of even one serious network vulnerability compromises the security of the entire facility. And this is what a pentest seeks to highlight.
Here the PenTest is the verification that proves that the computer system meets the necessary security requirements.
Once the attack is concluded, the Ethical Hacker prepares a report with a detailed analysis of the activities and proposes a remediation plan accordingly.
But what about the Vulnerability Assessment service? The Vulnerability Assessment service is also part of an ethical hacker’s job description.
In this case it is a security analysis, a comprehensive security check-up for the computer system that can assess any known vulnerabilities present. The test assigns severity levels (severity) to each detected vulnerability and specifies the fixes or remediation actions to be implemented.
Once these measures are implemented, it will again be up to the ethical hacker to test their effectiveness.


How does an ethical hacker act?
The ethical hacker then thinks and operates as if he or she were an attacker, and then can act as a defender of the information system. The purpose is to provide a picture of the actual level of risk to which an organization is subject and to study appropriate measures and countermeasures.
WATCH DUTY and Ethical Hacking


An example of the use of Ethical Hacking techniques is given by an incident that occurred in the United States
IN THE EARLY MORNING OF OCTOBER 8, 2017, when a dozen different fires broke out in Sonoma County, California, Carrie Kramlich received a phone call. A friend who lived south of her said a fire was heading her way. Then came another phone call, from someone who lived to the north. The fire was burning there, too. Kramlich and her husband wandered around in a house filled with the smell of smoke, trying to come to terms with the idea of being surrounded by flames.
“We thought, “What is going on?”.” recounts Kramlich. “This is Armageddon. This is a war.”
Throughout, they received only one official warning: an automated voice message from the county sheriff’s office warning them to evacuate.
A series of fires in the area burned 245,000 acres, destroyed nearly 9,000 buildings and killed 44 people. Fortunately, Kramlich’s home and her family were saved. But the experience was harrowing and made her realize how poorly she was informed about the fires.
Five years later, he discovered the Watch Duty app, which allows anyone to track active fires throughout California. The free, nonprofit service is not associated with any official emergency agency. It is run by volunteers who verify and post new information, photos and map coordinates in real time, often well before state or local first responder agencies issue official statements. The community that powers Watch Duty has made it one of the fastest sources of updates on California wildfires.
Data scarcity
Fires, by their nature, are very difficult to track in real time. They can burn quickly, in any direction, and often blaze in deeply forested and largely inaccessible rural areas. Overworked and over-resourced, official responders struggle to fight fires and keep the public informed of the fire’s every move. Alert services like Nixle allow people to sign up for official alerts, but can leave residents worried. These services tend to send notifications only for the most serious and immediate situations, such as evacuations, and their effectiveness varies depending on the local agencies responsible for the situation.
This is where social media volunteers have come in. People in Facebook groups and on Fire Twitter have created entire communities of vigilant fire watchers who seek to share accurate and timely fire information with the public.
Animated GIF showing the news feed on the Watch Duty app
COURTESY OF WATCH DUTY
Watch Duty aims to distill these often disparate efforts into something more direct and tangible. Opening the app reveals a map of California. Throughout the state, depending on the season, there are a series of red and yellow icons indicating the location of active wildfires. If you zoom in on the map, tap an icon, relevant information appears: evacuation zones, a map showing the perimeter of where the fire has broken out, and a scrolling feed of updates on fire movement. All new updates from official sources are added by one of Watch Duty’s volunteers, so anyone following the fire can see the latest news from official and unofficial sources in one place and in near real-time. Users can follow up to eight California counties for free. Users who make a donation (as little as $1) can follow all 58 counties in the state. Whenever the app has new information to broadcast about fires in the counties being tracked, it sends an alert accompanied by a customized audio notification that plays the sound of a roaring fire.
Having a dedicated app that gathers all available information about a fire is a balm for concerned Californians.
“There is a fear of being at risk,” Kramlich says. “Watch Duty is my Valium.”
FINALE
Returning to the problem of "scattered" garbage in Italian counties, what could we do? Taking a cue from Watch Duty, we could create an application ( for Desktops or smartphones ) that would allow any free citizen to photograph, geolocate and report to the relevant bodies the sites of illegal dumping and abandonment of this waste. So, to intervene in time relae in the removal and, why not, also trace the perpetrators of such misdeeds.
Continuous monitoring would deter such crimes over time and bring back intact enjoyment of the tourist and environmental asset.
A week-long trip to Apulia ( Italy ) amid stories and traditions of Saints and Demons – Small group departure September 26, 2022 – Fetails Below


All Saints plus One
One of our Apulia travel packages to discover how the Deities of the 1300s are our recent Superheroes
Contact Us
Address
via Ammiraglio Millo, 9
info@ailovetourism.com
Phone
+39 339 5856822