Ethical Hacking
During the devolpment of the Internet, computer security
has become a major concern for businesses and governments. They want to be able
to take advantage of the Internet for electronic commerce, advertising,
information distribution and access, and other pursuits, but they are worried
about the possibility of being “hacked.” At the same time, the potential
customers of these services are worried about maintaining control of personal
information that varies from credit card numbers to social security numbers and
home addresses.
In their search for a way to approach the problem, organizations
came to realize that one of the best ways to evaluate the intruder threat to
their interests would be to have independent computer security professionals
attempt to break into their computer systems. This scheme is similar to having
independent auditors come into an organization to verify its bookkeeping
records. In the case of computer security, these “tiger teams” or
“ethical hackers” would employ the same
tools and techniques as the intruders, but they would neither damage the target
systems nor steal information. Instead, they would evaluate the target systems'
security and report back to the owners with the vulnerabilities they found and
instructions for how to remedy them.
You can download full Ethical Hacking seminar abstract from here.
0 comments:
Post a Comment