Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
A penetration test, occasionally pentest, is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access). | M c EH Certified Ethical Hacker Ethical Hacking and Countermeasures Version 6 Module XXVI Penetration Testing IM c E H News Certified Ethical Hacker jeSeattletTimes watt I etì EWfi.com Sunday November 4 2007 - Page updated at 02 03 AM Permission to reprint or copy this article or photo other than personal use must be obtained from The Seattle Tm resale@y eattletimes.com with your request. tfEthical hackers hired to act like the bad guys By Shaheen Samavati Newhouse News Service With Social Security numbers credit-card information and bank records making the move online malicious hackers hold more power than ever. Rapid changes in technology have made it tough for banks retailers and other companies that store databases of consumer information to keep up with the latest Internet crime tactics. For Cleveland-based Third Federal Savings Loan the solution was simple It hired hackers to try to crack its Web site before any bad guys got the chance. This business of ethical hacking or penetration testing has become commonplace among financial institutions and major corporations over the past six years. But increasingly companies of all types and sizes are hiring security experts to act like the enemy. There s always been people breaking into Web sites said Chris Wysopal an expert in information security. But now there s much more of a criminal element. It s gone almost commercial. __ .7 . __ Source http seattletimes.nwsource.com Copyright by Ec-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited IM c EH Module Objective Certified Ethical Hacker This module will familiarize you with Penetration Testing PT Security Assessments Risk Management Automated Testing Manual Testing Enumerating Devices Denial of Service Emulation HackerShield Pentest using various devices VigilENT WebInspect Tools EC-Council Copyright by Ec-Council All Rights Reserved. Reproduction is Strictly .