Ethical hacking: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create page: Source The Group Treasurer: an ACT Guide to the first 100 days, Page 51.)
 
imported>Doug Williamson
(Expand defiinition.)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
''Cybersecurity.''
''Risk management - cybersecurity.''


Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity.
Ethical hacking is designed to help organisations to identify areas where they need to improve their cybersecurity.
 
It involves a specialist firm or individual, with the authority and knowledge of senior management, attempting to gain access to the organisation's systems in ways that cybercriminals might attempt, without the prior knowledge of middle and junior staff.




Line 13: Line 15:
* [[Ethical hacker]]
* [[Ethical hacker]]
* [[Hack]]
* [[Hack]]
* [[Risk management]]
[[Category:Manage_risks]]
[[Category:Technology]]

Latest revision as of 15:49, 14 October 2020

Risk management - cybersecurity.

Ethical hacking is designed to help organisations to identify areas where they need to improve their cybersecurity.

It involves a specialist firm or individual, with the authority and knowledge of senior management, attempting to gain access to the organisation's systems in ways that cybercriminals might attempt, without the prior knowledge of middle and junior staff.


Security review
"Have a professional firm review your security, by carrying out attempted hacks – there are now many providers of this ‘ethical hacking’ service."
The Group Treasurer: An ACT guide to the first 100 days, page 50.


See also