Ethical Hacking
Ethical hacking and ethical hacker are terms used to describe hacking
performed by a company or individual to help identify potential threats
on a computer or network. An ethical hacker attempts to bypass system
security and search for any weak points that could be exploited by
malicious hackers. This information is then used by the organization to
improve the system security, in an effort to minimize or eliminate any
potential attacks.Rules For Ethical Hacking
For ethical hacking the hacker must obey the following rules :
- Expressed (often written) permission to probe the network and attempt to identify potential security risks.
- You respect the individual's or company's privacy.
- You close out your work, not leaving anything open for you or someone else to exploit at a later time.
- You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.
Hacking For Dummies, 4th Edition
The best way to stay safe online is to stop hackers befor e they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.
To read this book you will be able to
- Guides you through the techniques and tools you need to stop hackers before they hack you
- Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
- Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
- Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place



