Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.
What constitutes ethical hacking?
For hacking to be deemed ethical, the hacker must obey the following rules:
-
Expressed (often written) permission to probe the network and attempt to identify potential security risks.
-
You respect the individual's or company's privacy.
-
You close out your work, not leaving anything open for you or someone else to exploit at a later time.
-
You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.