Difference between revisions of "White hat hacker"
From Clinfowiki
(One intermediate revision by one user not shown) | |||
Line 1: | Line 1: | ||
− | + | White Hat Hacker: An ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. <ref name="White Hat"> http://en.wikipedia.org/wiki/White_hat_%28computer_security%29</ref> | |
An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:<ref name="Ethical Hacking"> http://pdf.textfiles.com/security/palmer.pdf</ref> | An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:<ref name="Ethical Hacking"> http://pdf.textfiles.com/security/palmer.pdf</ref> | ||
Line 5: | Line 5: | ||
* What can an intruder do with that information? | * What can an intruder do with that information? | ||
* Does anyone at the target notice the intruder’s attempts or successes? | * Does anyone at the target notice the intruder’s attempts or successes? | ||
+ | |||
+ | Personal Definition: An individual who focuses on finding weak points in an information system in order to prevent malicious hackers from capitalizing on these soft spots. The goal of a white hat hacker is to ensure the utmost safety for an organization's electronic system. | ||
=References:= | =References:= | ||
<references/> | <references/> |
Latest revision as of 19:38, 8 April 2015
White Hat Hacker: An ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. [1]
An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:[2]
- What can an intruder see on the target systems?
- What can an intruder do with that information?
- Does anyone at the target notice the intruder’s attempts or successes?
Personal Definition: An individual who focuses on finding weak points in an information system in order to prevent malicious hackers from capitalizing on these soft spots. The goal of a white hat hacker is to ensure the utmost safety for an organization's electronic system.