Ethical Hacking A Licence To Hack
Ethical Hacking A Licence To Hack
Ethical Hacking A Licence To Hack
Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments.
Companies are worried about the possibility of being hacked and potential customers are worried about maintaining control of personal information.
Necessity of computer security professionals to break into the systems of the organisation.
INTRODUCTION
Ethical hackers employ the same tools and techniques as the intruders. They neither damage the target systems nor steal information. The tool is not an automated hacker program rather it is an audit that both identifies the vulnerabilities of a system and provide advice on how to eliminate them.
AREAS TO BE TESTED
Application servers
Firewalls and security devices Network security
Wireless security
Competitive Intelligence
A systematic and ethical program for maintaining external information that can affect your companys plans. It is legal collection and analysis of information regarding the vulnerabilities of the business partners. The same information used to aid a company can be used to compete with the company. The way to protect the information is to be aware of how it may be used.
Conclusions
Never underestimate the attacker or overestimate our existing posture. A company may be target not just for its information but potentially for its various transactions. To protect against an attack, understanding where the systems are vulnerable is necessary. Ethical hacking helps companies first comprehend their risk and then, manage them.
Conclusions
Always security professionals are one step behind the hackers and crackers. Plan for the unplanned attacks. The role of ethical hacking in security is to provide customers with awareness of how they could be attacked and why they are targeted. Security though a pain, is necessary.
References
1.www.javvin.com 2.www.computerworld.com 3.www.research.ibm.com/journals 4.www.howstuffworks.com 5.Information Technology journal,september,august 2005,published by EFY. 6.IEEE journal on" security and privacy
Queries?