Ethical Hacking

Topics: Black hat, Hacker, Grey hat, Computer security / Pages: 10 (2253 words) / Published: May 4th, 2012
Overview

Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. Because of criminal hackers, ethical hacking is rapidly becoming an accepted business practice.

One of the most significant current discussions in the information technology community is Ethical hacking? The topic of discussion varies from “why is ethical hacking so popular?” to “Can hacking be ethical?”

What is ethical hacking?

Ethical hacking is the controversial practice of employing the tools and tactics of hackers to test the security precautions protecting a network. Ethical hacking is also called “penetration testing” and “intrusion testing” or “red teaming,” a term used when the U.S. government began hacking its own systems in the 1970s. In the 1980s, Telecommunications companies – a frequent target of budding cyber vandals who could gain street credibility by messing with the local phone company – began using ethical hacking as well. Banks caught on in the 1990s, and later in that decade, most e-commerce firms depended on ethical hacking as a critical security measure, since a single interruption or intrusion could cause massive financial problems. Consequently, a company main goal in hiring ethical hackers is to test for vulnerabilities and

You May Also Find These Documents Helpful

  • Ethical Hacking
  • Ethical Hacking
  • ETHICAL HACKING
  • Ethical Hacking
  • Ethical Hacking
  • Ethical Hacking
  • Ethical Hacking
  • Ethical Computer Hacking
  • Certified Ethical Hacking
  • Computer Hacking Is It Ethical