WHO ARE ETHICAL HACKERS?
Successful ethical hackers possess a variety of skills. First and foremost, they must be
completely trustworthy. While testing the security of a client’s systems, the ethical
hacker may discover information about the client that should remain secret. In many
cases, this information, if publicized, could lead to real intruders breaking into the
systems, possibly leading to financial losses. During an evaluation, the ethical hacker
often holds the “keys to the company,” and therefore must be trusted to exercise tight
control over any information about a target that could be misused. The sensitivity of
the information gathered during an evaluation requires that strong measures be taken
to ensure the security of the systems being employed by the ethical hackers
themselves: limited-access labs with physical security protection and full ceiling-to
-floor walls, multiple secure Internet connections, a safe to hold paper documentation
from clients, strong cryptography to protect electronic results, and isolated networks
Who are ethical hackers? is part of Business Exchange, suggested by sakuntala sahoo. This topic contains 0 news and 0 blog items. Read updated news, blogs, and resources about Who are ethical hackers?. Find user-submitted articles and reactions on Who are ethical hackers? from like-minded professionals.
Please add new articles to this topic