Ethical Hacking
From Computing and Software Wiki
(Difference between revisions)
(Framework and layout for the page completed. This creates a template to be filled in.) |
m (Separated overview into two paragraphs.) |
||
Line 1: | Line 1: | ||
[[Image:Whitehat.png|thumb|Ethical Hackers are often referred to as Whitehat Hackers or Whitehats]] | [[Image:Whitehat.png|thumb|Ethical Hackers are often referred to as Whitehat Hackers or Whitehats]] | ||
- | '''Ethical Hacking''', also known as ''penetration testing'', ''intrusion testing'', or ''read teaming'', is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. An '''Ethical Hacker''', also known as a ''whitehat hacker'', or simply a ''whitehat'', is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certified ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others. | + | '''Ethical Hacking''', also known as ''penetration testing'', ''intrusion testing'', or ''read teaming'', is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. |
+ | |||
+ | An '''Ethical Hacker''', also known as a ''whitehat hacker'', or simply a ''whitehat'', is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certified ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others. | ||
== What is Ethical Hacking? == | == What is Ethical Hacking? == |
Revision as of 20:03, 6 April 2009
Ethical Hacking, also known as penetration testing, intrusion testing, or read teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.
An Ethical Hacker, also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certified ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others.
Contents |