Preview

hacking

Powerful Essays
Open Document
Open Document
8064 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
hacking
Pace University

DigitalCommons@Pace
Honors College Theses

Pforzheimer Honors College

8-24-2005

The Role of White Hat Hackers in Information
Security
Amit Anand Jagnarine
Pace University

Follow this and additional works at: http://digitalcommons.pace.edu/honorscollege_theses
Part of the Other Computer Sciences Commons
Recommended Citation
Jagnarine, Amit Anand, "The Role of White Hat Hackers in Information Security" (2005). Honors College Theses. Paper 14. http://digitalcommons.pace.edu/honorscollege_theses/14 This Article is brought to you for free and open access by the Pforzheimer Honors College at DigitalCommons@Pace. It has been accepted for inclusion in Honors College Theses by an authorized administrator of DigitalCommons@Pace. For more information, please contact rracelis@pace.edu. The Role of White Hat Hackers in
Information Security

Amit Anand Jagnarine

Pace University
Phorziemer’s Honors College
Thesis Paper
Due Date: 16 May 2005

2
The Role of White Hat Hackers in Information Security

Information security has become one of the most important concepts in our information and technology driven world.

Because of this notion of ubiquitous

computing and the on-demand flow and exchange of information, it becomes essential to protect and secure any and all critical information.

Information security involves

employing certain techniques and components to protect interconnected systems and more importantly, the data and information used by those systems. It revolves around maintaining three basic characteristics of information—confidentiality, integrity, and availability. The goal of information system security has now been augmented by what is known as “white hat” hacking. White hat hacking is an interesting development in the fight against keeping the bad guys out and securing sensitive information. The idea is that there exists a new breed of ethical-minded hackers that penetrate systems to

You May Also Find These Documents Helpful