Difference between revisions of "White hat hacker"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
A white hat hacker attempts to break the security of their client's systems for non-malicious reasons, such as to test their own security system and detect areas where they are vulnerable to security breaches.<ref name="White hats to the rescue">White hats to the rescue http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue </ref>
+
White Hat Hacker: An ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. <ref name="White Hat"> http://en.wikipedia.org/wiki/White_hat_%28computer_security%29</ref>
  
 
An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:<ref name="Ethical Hacking"> http://pdf.textfiles.com/security/palmer.pdf</ref>
 
An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:<ref name="Ethical Hacking"> http://pdf.textfiles.com/security/palmer.pdf</ref>

Revision as of 19:33, 8 April 2015

White Hat Hacker: An ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. [1]

An ethical hacker’s evaluation of a system’s security seeks answers to three basic questions:[2]

  • What can an intruder see on the target systems?
  • What can an intruder do with that information?
  • Does anyone at the target notice the intruder’s attempts or successes?

References:

  1. http://en.wikipedia.org/wiki/White_hat_%28computer_security%29
  2. http://pdf.textfiles.com/security/palmer.pdf