Hacking is unauthorized use of computer and network resources.
The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.
The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.
We work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request (ranging from Web server probes to all-out attacks), we gather as much information as we can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses.
Examples of weaknesses include poor configuration of Web servers, poor web hosting, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. In nearly all the cases, the Information Syhstems department is not informed of these planned attacks. Then we work with the customer to address the issues we've discovered.
The number of hackers in the world is very small, but there are lots of wannabes. When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position.
Facebook Comments Plugin by Master cMs>
Do you like this post? Please link back to this article by copying one of the codes below.
URL Of Post:
HTML Link Code:
BB (forum) link code:
0 comments:
Post a Comment