Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and techniques that hackers
use, but with one major difference that Ethical hacking is legal. Ethical
hacking is performed with the target’s permission. The intent of ethical
hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can
be better secured. It’s part of an overall information risk management program
that allows for ongoing security improvements.
Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.
Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.
Security:
Security is the condition of being protected against danger
or loss. In the general sense, security is a concept similar to safety. In the
case of networks the security is also called the information security.
Information security means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction
Need for Security:
Computer security is required because most organizations can
be damaged by hostile software or intruders. There may be several forms of
damage which are obviously interrelated which are produced by the intruders.
These include:
● lose of confidential data
● Damage or destruction of data
● Damage or destruction of computer system
● Loss of reputation of a company
Hacking
Eric Raymond, compiler of “The New Hacker's Dictionary”,
defines a hacker as a clever programmer. A "good hack" is a clever
solution to a programming problem and "hacking" is the act of doing
it. Raymond lists five possible characteristics that qualify one as a hacker,
which we paraphrase here:
● A person who enjoys learning details of a programming
language or system
● A person who enjoys actually doing the programming rather
than just theorizing about it
● A person capable of appreciating someone else's hacking
● A person who picks up programming quickly
● A person who is an expert at a particular programming
language or system
download ppt and doc here
No comments:
Post a Comment