Ethical hackers: putting on the white hat

نویسنده

  • Tracey Caldwell
چکیده

“Web applications have become increasingly complex and highly vulnerable,” says Peter Wood, member of the ISACA Security Advisory Group and CEO of First Base Technologies. “Social networking sites, consumer technologies – smartphones, tablets etc – and cloud services are all game changers this year. More enterprises are now requesting social engineering tests, which shows an increased awareness of threats beyond website attacks.”

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes

Identifying security vulnerabilities in software is a critical task that requires significant human effort. Currently, vulnerability discovery is often the responsibility of software testers before release and white-hat hackers (often within bug bounty programs) afterward. This arrangement can be ad-hoc and far from ideal; for example, if testers could identify more vulnerabilities, software wo...

متن کامل

Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs

Despite significant progress in software-engineering practices, software utilized for desktop and mobile computing remains insecure. At the same time, the consumer and business information handled by these programs is growing in its richness and monetization potential, which triggers significant privacy and security concerns. In response to these challenges, companies are increasingly harvestin...

متن کامل

Virtuous Hackers: developing ethical sensitivity in a community of practice

It is estimated that losses due to computer break-ins by malicious 'crackers' (who might be external intruders or disgruntled employees intent on personal gain or revenge) are costing companies billions of dollars each year. But former hackers are now assisting the computer security industry to track down such intruders, and to develop sound security practices in order to ward off future attack...

متن کامل

Hiring Ex-Criminal Hackers

Suppose someone applies for a system administrator job, or, better yet, an open slot on your computer security team. The applicant is eminently qualified for the position, having wizard-like skills on the exact operating systems deployed throughout your organization. You need his skills, big time. However, the candidate poses a bit of a problem. This otherwise-stellar applicant has a bit of a s...

متن کامل

Advancing the Science of Digital Forensics

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society DECEMBER 2012 25 rough equivalent of today’s file allocation table (FAT) or $Bitmap. A consultant systems programmer came in to show us how to recover the files by reconstructing the VTOC based upon the prior morning’s routine printout of the hard drive contents (yes, we made such a printout every day or two). Since we could...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Network Security

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011