An ethical hacker is acomputer and network expert whoattacks a security system on behalf of itsowners, seeking vulnerabilities that amalicious hackercould exploit.
Ethical hacking is also known as
. An ethical hacker issometimes called awhite hat,a term that
comes from old Western movies, wherethe "good guy" were a white hat and the"bad guy" were a black hat.
WHY- ETHICAL HACKING:
Protection from possible externalAttacksFig :1.Types of attacks.
DENIAL OF SERVICE:
An attack with which an attackerrenders a system unusable orsignificantly slow down the system.Methods include:
Flood a network.
Software Vulnerability attacks.
Disrupt connections between twomachines.
Prevent a particular individualfrom accessing a service.
It is an art of using influence andpersuasion to deceive people for thepurpose of obtaining information or toperform some action. Even with allfirewalls, authentication processes, VPN,companies are still wide open to attacks.Humans are the weakest link in thesecurity chain. It is the hardest form of attack to defend against.
What does an ethical hacker do?
An ethical hacker's evaluation of asystem's security seeks answers to threebasic questions:1.What can an intruder see on thetarget systems?2. What can an intruder do withthat information?3. Does anyone at the target noticethe intruder's attempts orsuccesses?
Viruses,Trojan Horses,and WormsSocialEngineeringAutomatedAttacksAccidentalBreaches inSecurityDenial of Service(DoS)OrganizationalAttacks