White Hat
Ethical hacking is the act of having individuals who are professionals on how computer and networks systems work seek vulnerabilities and deficiencies in a network computer's security system so that they may know how and what other computer hackers can and cannot break into (Bishop 2007). This type of hacking is done so that companies themselves could know what information is more vulnerable than others, and how secure their security systems actually are. Ethical hackers attempt to break into data systems in a non-malicious way so that they may know how much others who do have bad intentions can access (Palmer 2001). The individual who conducts this ethical hacking is sometimes referred to as a "white hat" as opposed to a "black hat" which are both references from Western movies depicting the "good guy" and the "bad guy." In order for a network to be truly secure, it must be thoroughly examined through the perspective of an illegal hacker, and that is what an ethical hacker does (Caldwell 2011).
The objective of an ethical hacker is to test every type of vulnerability that a network system could have. In order to do this, ethical hackers need to first familiarize themselves with the entire network and its functionalities. An ethical hacker will need to hack into the network and break into their system as the first step in their ethical hacking process (Bishop 2007). After the break...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now