Search This Blog

Who are Ethical Hackers?

Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trust worthy. While testing the security of a client’s systems, the ethical hacker may discover information about the client that should remain secret. In many cases, this information, if publicized, could lead to real intruders breaking into the systems, possibly leading to financial losses. During an evaluation, the ethical hacker often holds the “keys to the company,” and therefore must be trusted to exercise tight control over any information about a target that could be misused. The sensitivity of the information gathered during an evaluation requires that strong measures be taken to ensure the security of the systems being employed by the ethical hackers themselves: limited-access labs with physical security protection and full ceiling-to-floor walls, multiple secure Inter net connections, a safe to hold paper documentation from clients, strong cryptography to protect electronic results, and isolated networks for testing. Ethical hackers typically have very strong programming and computer networking skills and have been in the computer and networking business for several years. They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems. These base skills are augmented with detailed knowledge of the hardware and soft- ware provided by the more popular computer and networking hardware vendors. It should be noted that an additional specialization in security is not always necessary, as strong skills in the other areas imply a very good understanding of how the security on various systems is maintained. These systems management skills are necessary for the actual vulnerability testing, but are equally important when preparing the report for the client after the test. Given these qualifications, how does one go about finding such individuals? The best ethical hacker candidates will have success fully mastered hacking tools and their exploits.

What do Ethical Hackers do?
An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:
• What can an intruder see on the target systems?
• What can an intruder do with that information?
• Does anyone at the target notice the intruder’s at tempts or successes?
• What are you trying to protect?
• What are you trying to protect against?
• How much time, effort, and money are you willing to expend to obtain adequate protection determined, a security evaluation plan is drawn up that identifies the systems to be tested, how they should be tested, and any limitations on that testing.

1 comments:

Smith said...

Asif Zamir,Great post!Thanks for sharing such a nice article,The most interesting job in the field of security is being an Ethical Hacker.
By the way check out the professional training and Certification for CEH(Certified Ethical Hacker) from EC-Council here
http://www.eccouncil.org/certification/certified_ethical_hacker.aspx

Post a Comment

Please enter you comments or your question what ever you have regarding Graphic Designing. Thanks

Blog Widget by LinkWithin