Ethical hacker

From Citizendium
Revision as of 20:04, 10 March 2012 by imported>David Drever (Created page with "{{subpages}} <!-- Please ignore (but don't delete) any formatting that you are not familiar with. Others will probably chime in to help you set things up. --> An '''ethical''' o...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
This article is developed but not approved.
Main Article
Discussion
Definition [?]
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable, developed Main Article is subject to a disclaimer.

An ethical or “white hathacker is the term given to an expert in information technology security. Ethical, meaning they do not use their skills to access systems for personal gain (this is the term given to a “black hat” or non-ethical hacker), but instead use their knowledge and experience to test systems for exploits and vulnerabilities to protect these systems.[1]

History of the Ethical Hacker

Ethical hacking began as early as the 1970’s when the US government attempted to hack it’s own system.[2] Later, in the 1980’s ethical hacking moved into the telecommunications business where they had been targets of “cybervandals” trying to damage local telephone companies. In the 1990’s as banks became more available online, they too began to make use of ethical hacking to protect themselves. Following shortly behind the banks came e-commerce websites (think Amazaon) who also made use of ethical hacking to protect themselves.[3]


What an ethical hacker looks for

A White Hat will use ethical hacking methods to answer three basic questions:

  1. What can an intruder see on the target systems?
 *What data is available to a hacker should he\she gain access to the systems.  This could be anything from pictures to business documents to information databases.


References

  1. wiseGeek. What Is Ethical Hacking?. Retrieved on 2012-03-10.
  2. Marilyn Leathers. A Closer Look at Ethical Hacking and Hackers. Retrieved on 2012-03-10.
  3. Bill Coffin. It Takes a Thief: Ethical Hackers Test Your Defenses. Retrieved on 2012-03-10.