Ethical Hacking For Beginners Part 3

Ethical Hacking For Beginners Part 3

Description

This is part 3 of Ethical Hacking For Beginners Course.

Security Professionals follow four key protocol concepts:

  1. Stay legal: Obtain proper approval before accessing and performing a security assessment.
  2. Define the scope: Determine the scope of the assessment so that the ethical hacker’s work remains legal and within the organization’s approved boundaries.
  3. Report vulnerabilities: Notify the organization of all vulnerabilities discovered during the assessment. Provide remediation advice for resolving these vulnerabilities.
  4. Respect data sensitivity: Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement, in addition to other terms and conditions required by the assessed organization.

An ethical hacker, also referred to as a white hat hacker, is an information security (infosec) expert who penetrates a computer system, network, application or other computing resource on behalf of its owners — and with their authorization. Organizations call on ethical hackers to uncover potential security vulnerabilities that malicious hackers could exploit.

Leave a Reply