Lecture 15
Lecture 15
Introduction
Ethical hacking also known as
penetration testing or white-hat hacking,
involves the same tools, tricks, and
techniques that hackers use,but with one
major difference that Ethical hacking is
legal.
Ethical Hacking
Independent computer security Professionals breaking into the
computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security
and report back to owners
about the bugs found.
Who are Hackers?
A person who enjoys learning details
of a programming language or system.
A person capable of
appreciating someone else's
hacking.
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Required Skills of an Ethical Hacker
Microsoft: skills in operation, configuration and management.
An evolving technique.
Disadvantages
All depends upon the trustworthiness of the ethical hacker