Ethical hacking

Updated: 07/31/2022 by Computer Hope
White hat

Ethical hacking and ethical hacker describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that malicious hackers could exploit. The organization then uses this information to improve system security and minimize or eliminate potential attacks.

What constitutes ethical hacking?

For hacking to be deemed ethical, the hacker must obey the following rules:

  1. Expressed (often written) permission to probe the network and attempt to identify potential security risks.
  2. You respect the individual's or company's privacy.
  3. You close out your work, not leaving anything open for you or someone else to exploit later.
  4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
Note

To protect yourself legally in a court of law, you must have a written and signed permission/contract for the assets you are probing, testing, or hacking.

The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it, and those who do the hacking are commonly called computer criminals or cyber criminals. However, ethical hackers' who work for organizations have helped improve system security and can be said to be quite effective and successful.

Individuals interested in becoming ethical hackers can work towards certification to become a CEH (certified ethical hacker). This certification is provided by the International Council of EC-Council (E-Commerce Consultants). The exam costs about $500 and consists of 125 multiple-choice questions in version 8 of the test (version 7 consisted of 150 multiple-choice questions). Before taking a CEH class or exam, you'll need to know computer security issues and terms.

BackBox, Bug bounty, Certifications, Computer abbreviations, Cyberwar, Ethics, Hacker, Hacktivism, Security terms, White hat