Difference between revisions of "White hat hacker"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
 
A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.<ref name="White hats to the rescue">White hats to the rescue http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue </ref>
 
A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.<ref name="White hats to the rescue">White hats to the rescue http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue </ref>
 +
 +
An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:<ref name="Ethical Hacking"> http://pdf.textfiles.com/security/palmer.pdf</ref>
 +
* What can an intruder see on the target systems?
 +
* What can an intruder do with that information?
 +
* Does anyone at the target notice the intruder’s attempts or successes?
  
 
=References:=  
 
=References:=  
 
<references/>
 
<references/>

Revision as of 19:30, 8 April 2015

A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.[1]

An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:[2]

  • What can an intruder see on the target systems?
  • What can an intruder do with that information?
  • Does anyone at the target notice the intruder’s attempts or successes?

References:

  1. White hats to the rescue http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue
  2. http://pdf.textfiles.com/security/palmer.pdf