White Hat Hacking
White Hat Hacking is used to describe the process of an information infrastructure owner testing the robustness of his or her own system. The information security staff of the business or organization can do the same thing or a third-party can be used to do so. Testing to determine the vulnerabilities of an information assurance program would be considered an excellent due diligence practice. One organization, Gibson Research Corporation, conducts a basic test of an individual or organization’s online security system with its “Shields Up” application. Attacks against the owner’s system are run to test typical vulnerabilities.
Its Relevance: Information infrastructure owners must know if attempts to intrude upon the system will be thwarted. Organizational policies need to exist that describe how the testing of the system is to occur and with what frequency.
Return from "White Hat Hacking" to Words [S - U]