Ethical Hacking and Security

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

Ethical hacking, or authorized virtual attacks on information systems designed to uncover vulnerabilities, speaks to Chinese war authority Sun Tzu’s ancient aphorism about understanding one’s enemy. “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle,” he said.

 

Because having insights into the tactics and strategies of one’s opposition is such an effective means to defend against them, ethical hacking methodologies have been working their way into more and more IT security training and certification programs. One of these is the International Council of E-Commerce Consultants’ (EC-Council) Certified Ethical Hacker (CEH) credential. In this month’s Security community feature, Sanjay Bavisi and Sangeetha Thomas of the EC-Council discuss the CEH program as well as ethical hacking in general. Click here to find out more about both.

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>