06-06-2012, 12:25 PM
ETHICAL HACKING
ETHICAL HACKING.ppt (Size: 2.22 MB / Downloads: 342)
INTRODUCTION
Ethical hacking- also known as penetration testing or intrusion testing or red teaming has become a major concern for businesses and governments.
Companies are worried about the possibility of being “hacked” and potential customers are worried about maintaining control of personal information.
Necessity of computer security professionals to break into the systems of the organisation.
PLANNING THE TEST
Aspects that should be focused on:
Who should perform penetration testing?
How often the tests have to be conducted?
What are the methods of measuring and communicating the results?
What if something unexpected happens during the test and brings the whole system down?
What are the organization's security policies?
Ethical hacking- a dynamic process
Running through the penetration test once gives the current set of security issues which subject to change.
Penetration testing must be continuous to ensure that system movements and newly installed applications do not introduce new vulnerabilities into the system.
Who are ethical hackers
Should have more patience.
Continuous updating of the knowledge on computer and network security is required.
They should know the techniques of the criminals, how their activities might be detected and how to stop them.