The Characteristics Of Ethical Hacking

1592 Words7 Pages
INTRODUCTION

Ethical hacking & ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security & search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.
For hacking to be deemed ethical, the hacker must obey the following rules:
• Expressed (often written) permission to probe the network & attempt to identify potential security risks.

• You respect the individual 's or company 's privacy.

• You close out your work, not leaving anything open for you or someone else to exploit at a later time.

• You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.

The purpose of ethical hacking is to evaluate the security of a network or system 's infrastructure. It entails finding & attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known & unknown hardware or software flaws, & operational weaknesses in process or technical countermeasures. One of the first examples of
Open Document