They identify the weak points and based on that, they give advice or suggestions to strengthen the security. They try to break the security of a computer system, network, or applications. It can be performed manually or through an automation tool.Įthical hackers work as an information security expert. Penetration testing is another name of ethical hacking. To strengthen security, ethical hackers use their skills to find vulnerabilities, document them, and suggest ways to rectify them.Ĭompanies that provide online services or those which are connected to the internet, must perform penetration testing by ethical hackers. A person who performs the hacking activities is called a hacker.Ī security professional who uses his/her hacking skills for defensive purposes is called an ethical hacker.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |