ethical hacker
An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
Go Now: Malware Protection Best Practices
Should security teams clean up the malware and move on or format the hard drives to start over with a clean system? In this expert guide, security pros weigh in on how antimalware protects the enterprise.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security.
The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems. It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.
Any organization that has a network connected to the Internet or provides an online service should consider subjecting it to a penetration test. Various standards such as the Payment Card Industry Data Security Standard require companies to conduct penetration testing from both an internal and external perspective on an annual basis and after any significant change in the infrastructure or applications. Many large companies, such as IBM, maintain employee teams of ethical hackers, while there are plenty of firms that offer ethical hacking as a service. Trustwave Holdings, Inc., has an Ethical Hacking Lab for attempting to exploit vulnerabilities that may be present in ATMs, point-of-sale devices and surveillance systems. There are various organizations that provide standards and certifications for consultants that conduct penetration testing including:
- CREST
- Mile2
- SANS Institute
- EC-Council
Ethical hacking is a proactive form of information security and is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a legal or white hat hacker and its counterpart a black hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. The term "ethical hacker" is frowned upon by some security professionals who see it has a contradiction in terms and prefer the name "penetration tester."
Before commissioning an organization or individual, it is considered a best practice to read their service-level and code of conduct agreements covering how testing will be carried out, and how the results will be handled, as they are likely to contain sensitive information about how the system tested. There have been instances of "ethical hackers" reporting vulnerabilities they have found while testing systems without the owner's express permission. Even the LulzSec black hat hacker group has claimed its motivations include drawing attention to computer security flaws and holes. This type of hacking is a criminal offence in most countries, even if the purported intentions were to improve system security. For hacking to be deemed ethical, the hacker must have the express permission from the owner to probe their network and attempt to identify potential security risks.
Continue Reading About ethical hacker
Dig Deeper on Hacker tools and techniques: Underground hacking sites
PRO+
Content
Find more PRO+ content and other member only offers, here.
Join the conversation
18 comments
"An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit."
Hence the question of the discussion is a bit irrelevant. Without permission hacking production systems is not really ethical.
On the other hand, exploring software systems via conventional methods available to all users is not "hacking", is it? The problem is, with nowaday's quality an innocent attempt has chances of bringing down the system :)
If you were the owner of a software company and you had been hacked, then what is the percentage of your gain and your lose?
Firstly you will check what the hacker exactly did to your own system/software. How did he upgrade it? Which technical method did he choose to make your software even better? And if he really did a good job, then he media will start to focus on your company about security and policy issues.
So there are 2 cases: If you are a small company, you will learn for the hacker's interference and you will try to make a better product with no damage on your business image since media will not be interested. On the other hand, if you are a big company a hacker will grow the market competition, and push you to make something more alternative. Moreover even if media will talk about the "knock" from the hacker, it's still an advertising for you.
So it will always be a 50-50!
act 2000.
ATTEMP OR INTRUSION IN A SYSTEM IS AN OFFENCE IN IT ACT 20000.ethical
Ethical word is confusing and giving no protection under law .it is basically
Denotes instructions obeyed by employee of his employer for the benignit
And protection of their system . In fact as long as another system has not disturbed
,it can be said ethical ,but if disturbed then unethical and is intrusion and both
Employee and employer may emerged as conspirators until hacker has done for himself only .