Ethical Hacking
From Computing and Software Wiki
(Difference between revisions)
m (Separated overview into two paragraphs.) |
m (Added a period to image caption.) |
||
Line 1: | Line 1: | ||
- | [[Image:Whitehat.png|thumb|Ethical Hackers are often referred to as Whitehat Hackers or Whitehats]] | + | [[Image:Whitehat.png|thumb|Ethical Hackers are often referred to as Whitehat Hackers or Whitehats.]] |
'''Ethical Hacking''', also known as ''penetration testing'', ''intrusion testing'', or ''read teaming'', is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. | '''Ethical Hacking''', also known as ''penetration testing'', ''intrusion testing'', or ''read teaming'', is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. |
Revision as of 20:04, 6 April 2009
Ethical Hacking, also known as penetration testing, intrusion testing, or read teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.
An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certified ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others.
Contents |