Ethical Hacking, Penetration Testing, and IT Security Assessments


So, what is an Ethical Hacker? An Ethical Hacker is a cyber security expert who is usually employed with the organization or consulting firm whose goal is to attempt to penetrate networks and/or computer systems using the same methods as a malicious hacker. Ethical Hackers are also sometimes referred to as "Penetration Testers" or "Red Team Members." Regardless of what you want to call them, what is most important, is that an Ethical Hacker has authorization to probe and attack the target before the network penetration test begins.

Why Should You Hire Ethical Hackers

The top reason that companies should consider ethical hacking is for the safety of their network. This is the best way for a organization to demonstrate the security of the company or to discover where there are breaches. Once the information is gathered, the ethical hackers and penetration test team can then offer a report on how to make the network safer.


IT Network Security Threats and Vulnerabilities

Security breaches and attacks can and do come from anywhere. Competitors, spies, rogue employees, bored teens, and even script kiddies are attacking computers to make trouble, steal information, and even sabotage systems. With the growth of the Internet, World Wide Web, and the many poorly protected systems connected to it, such actions have become even easier.

According to cyber security expert Michael Gregg, “Recent attacks on government websites in the United States and other countries have underscored the need for up-to-date information assurance training,” Today's threats are much different than in the past: bots, zombie computers, client side attacks, andcyber security attacks are all rising threats.

Scoping a Penetration Test

Regardless of what type of test you are asked to perform there are some basic questions you can ask to help establish the goals and objectives of the penetration test or network security assessment. These include the following:

  • What is the organizations mission?
  • What specific outcomes does the organization expect?
  • What is the budget? When will penetration test be performed, during work hours, after hours or weekends?
  • How much time will the organization commit to completing the network security assessment or penetration test?
  • Will insiders be notified there is an ongoing penetration test?
  • Will customers be notified of potential issues during the network security assessment?
  • How far will the penetration test proceed, will the ethical hackers root the Linux machines, gain a prompt on a vulnerable Windows computer, or attempt to retrieve another prize such as ethically hack the CEO’s password.
  • Who do you contact should something go wrong during the network security assessment?
  • What are the deliverables? Does management want an in-depth report of the vulnerabilities or are they seeking information on compliance to specific regulations.
  • What outcome is management seeking from these tests?

Building an Effective Response

Organizations are responding by placing an increased emphasis on IT network security. Part of the growth in this network security market has been in an increased need for IT security services, penetration testing, and vulnerability assessments. While these security audits and IT risk assessments can be performed by a variety of individuals and companies, many individuals performing these duties have decided to gain additional hacking skills. Why, because if you want to beat an attacker, you've got to think like a hacker.


For class outlines, specific dates, locations, and pricing information, please call our Training Director at (713) 482-8323 or email at TheSolutionFirm

Read Users' Comments (0)

0 Response to "Ethical Hacking, Penetration Testing, and IT Security Assessments"

Post a Comment