0% found this document useful (0 votes)
54 views3 pages

Network Seurity Assignment

Ethical hacking involves authorized attempts to hack systems to identify vulnerabilities from the perspective of a malicious attacker. It aims to duplicate attacker strategies and actions to find security issues before real attackers can exploit them. Ethical hackers must have expertise in areas like scripting languages, operating systems, and networking, as well as information security principles. They perform reconnaissance to gather information and then use automated and manual testing to uncover vulnerabilities, exploiting them to demonstrate how a real attacker could compromise the system. Ethical hackers must stay legal, define the scope of their work, report any vulnerabilities found, and respect sensitive data.

Uploaded by

roohan Adeel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views3 pages

Network Seurity Assignment

Ethical hacking involves authorized attempts to hack systems to identify vulnerabilities from the perspective of a malicious attacker. It aims to duplicate attacker strategies and actions to find security issues before real attackers can exploit them. Ethical hackers must have expertise in areas like scripting languages, operating systems, and networking, as well as information security principles. They perform reconnaissance to gather information and then use automated and manual testing to uncover vulnerabilities, exploiting them to demonstrate how a real attacker could compromise the system. Ethical hackers must stay legal, define the scope of their work, report any vulnerabilities found, and respect sensitive data.

Uploaded by

roohan Adeel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Laiba Imtiaz

2183405
Information Security
NCBA&E
What is the ethics behind training how to hack a system explain?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer
system, application, or data. Carrying out an ethical hack involves duplicating strategies and
actions of malicious attackers. This practice helps to identify security vulnerabilities which can
then be resolved before a malicious attacker has the opportunity to exploit them.
An ethical hacker should have a wide range of computer skills. They often specialize, becoming
subject matter experts (SME) on a particular area within the ethical hacking domain.
All ethical hackers should have:
 Expertise in scripting languages.
 Proficiency in operating systems.
 A thorough knowledge of networking.
 A solid foundation in the principles of information security.
While assessing the security of an organization’s IT asset(s), ethical hacking aims to mimic an
attacker. In doing so, they look for attack vectors against the target. The initial goal is to perform
reconnaissance, gaining as much information as possible.
Once the ethical hacker gathers enough information, they use it to look for vulnerabilities against
the asset. They perform this assessment with a combination of automated and manual testing.
Even sophisticated systems may have complex countermeasure technologies which may be
vulnerable.
They don’t stop at uncovering vulnerabilities. Ethical hackers use exploits against the
vulnerabilities to prove how a malicious attacker could exploit it.
Ethical concepts
Hacking experts follow four key protocol concepts:
Stay legal. Obtain proper approval before accessing and performing a security assessment.
Define the scope. Determine the scope of the assessment so that the ethical hacker’s work
remains legal and within the organization’s approved boundaries.
Report vulnerabilities. Notify the organization of all vulnerabilities discovered during the
assessment. Provide remediation advice for resolving these vulnerabilities.
Respect data sensitivity. Depending on the data sensitivity, ethical hackers may have to agree to
a non-disclosure agreement, in addition to other terms and conditions required by the assessed
organization.

You might also like