Difference between revisions of "White hat hacker"
From Clinfowiki
Line 1: | Line 1: | ||
A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.<ref name="White hats to the rescue">White hats to the rescue http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue </ref> | A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.<ref name="White hats to the rescue">White hats to the rescue http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue </ref> | ||
+ | |||
+ | An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:<ref name="Ethical Hacking"> http://pdf.textfiles.com/security/palmer.pdf</ref> | ||
+ | * What can an intruder see on the target systems? | ||
+ | * What can an intruder do with that information? | ||
+ | * Does anyone at the target notice the intruder’s attempts or successes? | ||
=References:= | =References:= | ||
<references/> | <references/> |
Revision as of 19:30, 8 April 2015
A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.[1]
An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:[2]
- What can an intruder see on the target systems?
- What can an intruder do with that information?
- Does anyone at the target notice the intruder’s attempts or successes?