Wednesday, December 2, 2009

Ethical Hacker

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security.
'ethical hackers are becoming a mainstay of the effort to make corporate networks more secure'
For hacking to be deemed ethical, the hacker must obey the following rules:
  • Expressed (often written) permission to probe the network and attempt to identify potential security risks.
  • You respect the individual's or company's privacy.
  • You close out your work, not leaving anything open for you or someone else to exploit at a later time.
  • You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.
Difference between Security and Protection
  • Security and protection are extremely close concepts though not same.
  • Security measures are adopted to increase the level of protection.
  • The feeling of protection arises when one has enough security measures.
  • Security is a type of protection against external threats.
When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired stills for any IT security professional.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.