According to (Marcus De Souza, 2011) “Today more and more software's are developing and people are getting more and more options in their present software's. But many are not aware that they are being hacked without their knowledge. One reaction to this state of affairs is a behavior termed “Ethical Hacking" which attempts to pro-actively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. ”
According to (Tricia Ellis 2011) As with most technological advances, there is also a dark side: “criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution,” but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help.
According to (Search Security 2009) “Ethical hacking also known as (penetration testing or white-hat hacking), involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.” Ethical hacking is performed with the target’s permission. “The intent of ethical hacking is to discover vulnerabilities from a hacker’s Viewpoint so systems can be better secured.” Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that sellers’ claims about the security of their products are legitimate.”
According to (Tricia Ellis 2011) A good ethical hacker should know the methodology chosen by the hacker like reconnaissance, host or target scanning, gaining access, maintaining access and clearing tracks. “For ethical hacking we should know about the various tools and methods that can be used by a black hat hacker apart from the methodology used by him.”
According to (Marcus De Souza 2011 ) “From the point of view of the user one should know at least some of these because some hackers make use of those who are not aware of the various hacking methods to hack into a system”. Also when thinking from the point of view of the developer, he also should be aware of these since he should be able to close holes in his software even with the usage of the various tools. With the advent of new tools the hackers may make new tactics. But at least the software will be resistant to some of the tools.
According to (Paul Walsh 2007 ) “Ethical hackers refer to security professional who apply their hacking skills for defensive purposes on behalf of its owners.” One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems and those professionals are called “ETHICAL HACKERS”.
According to (Paul Walsh 2007) “The idea of testing the security of a system by trying to break into it is not new.” Whether an automobile company is crash-testing cars, “or an individual is testing his or her skill at martial arts by sparring with a partner, evaluation by testing under attack from a real adversary is widely accepted as prudent.” It is, however, not sufficient by itself. From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security.
References:
Tricia Ellis,Wisegeek, 2011,What Is Ethical Hacker,Available from:
Search security, 2009, specific information resource for enterprise it professionals, Available from:
Paul Walsh, Ezine Articles, 2007, What Is Ethical Hacking, Available from:
Marcus De Souza, 2011, WIZiQ education.Online, presentation 2 IT Ethical Hacking Available from:
No comments:
Post a Comment