Ethical hacking: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
m (Add category.)
imported>Doug Williamson
(Expand heading.)
Line 1: Line 1:
''Cybersecurity.''
''Risk management - cybersecurity.''


Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity.
Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity.
Line 13: Line 13:
* [[Ethical hacker]]
* [[Ethical hacker]]
* [[Hack]]
* [[Hack]]
* [[Cybersececurity]]


[[Category:Manage_risks]]
[[Category:Manage_risks]]
[[Category:Technology]]
[[Category:Technology]]

Revision as of 15:45, 14 October 2020

Risk management - cybersecurity.

Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity.


Security review
"Have a professional firm review your security, by carrying out attempted hacks – there are now many providers of this ‘ethical hacking’ service."
The Group Treasurer: An ACT guide to the first 100 days, page 50.


See also