THE WHATIS.COM WORD-OF-THE-DAY   
August 26, 2003

ethical hacker 
________________
SPONSORED BY: Microsoft

The Quick Guide to Windows Server 2003. Get the latest information on
installation, new features and training. Click here!
http://WhatIs.com/r/0,,17393,00.htm?microsoft 

________________   
TODAY'S WORD: ethical hacker 
 
See our complete definition with hyperlinks at
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci921117,00.html 

An ethical hacker is a computer and network expert who attacks a
security system on behalf of its owners, seeking vulnerabilities that
a malicious hacker could exploit. Many large companies, such as IBM,
maintain employee teams of ethical hackers.

To test a security system, ethical hackers use the same methods as
their less principled counterparts, but report problems instead of
taking advantage of them. Ethical hacking is also known as
penetration testing, intrusion testing, and red teaming. An ethical
hacker is sometimes called a white hat, a term that comes from old
Western movies, where the "good guy" wore a white hat and the "bad
guy" wore a black hat. 

One of the first examples of ethical hackers at work was in the
1970s, when the United States government used groups of experts
called red teams to hack its own computer systems. According to Ed
Skoudis, Vice President of Security Strategy for Predictive Systems'
Global Integrity consulting practice, ethical hacking has continued
to grow in an otherwise lackluster IT industry, and is becoming
increasingly common outside the government and technology sectors
where it began. 

In a similar but distinct category, a hacktivist is more of a
vigilante: detecting, sometimes reporting (and sometimes exploiting)
security vulnerabilities as a form of social activism. 

______________________
RELATED TERMS:

hacker 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212220,00.html 

white hat 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html 

hacktivist
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci552919,00.html

______________________
SELECTED LINKS:

Risk Management's July 2003 cover story was "It takes a thief:
Ethical hackers test your defenses."  
http://www.ins.com/downloads/publications/risk_management_0703cover.pdf 

Sanctum offers a white paper called Ethical Hacking Techniques to
Audit and Secure Web-enabled Applications.  
http://www.sanctuminc.com/pdf/Ethical_Hacking_Techniques.pdf 

The Wall Street Journal Online has an article called "It Takes a
Hacker."  
http://webreprints.djreprints.com/00000000000000000025241001.html 

GoCertify explains Certification for Ethical Hackers.  
http://www.gocertify.com/article/ceh.shtml 

______________________
TODAY'S TECH NEWS:

EXPERT WORRIED SOBIG AUTHOR MAY ACCELERATE NEXT VARIANT
An antivirus expert said the next variant of Sobig may come sooner
than expected. 
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci920996,00.html 

ORACLE 9I XML COMPONENT VULNERABLE
Oracle Corp. is urging customers using 9i version 2 to patch a newly
identified vulnerability immediately and to disconnect their
databases from the Internet. 
http://searchoracle.techtarget.com/originalContent/0,289142,sid41_gci921068,00.html 

PEOPLESOFT PACK SOOTHES 'PAIN POINTS'
PeopleSoft's new CRM productivity pack zeroes in on integration,
synchronization and the new federal do-not-call list. 
http://searchcrm.techtarget.com/originalContent/0,289142,sid11_gci920879,00.html 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com/ 

______________________
Crash Course | OSI model

The OSI model is the conceptual backbone of most enterprise networks,
but how well do you understand it? Read our rundown of the OSI model
and find out what all those layers do. 
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci917009,00.html 

______________________
Secret Word-of-the-Day | What is IT?

HINT: In philosophy as in programming, this is the idea that when
trying to understand something, 'shaving off' unnecessary information
is the fastest way to enlightenment. 

>> See if you're right!
http://whatis.techtarget.com/definition/0,,sid9_gci212684,00.html 

_____________________
Quiz #19 | Artificial Intelligence

How much do you know about AI? Take this week's quiz and find out! 

>> Click to take the quiz
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci789222,00.html 

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] dark energy 
http://whatis.techtarget.com/definition/0,,sid9_gci917929,00.html 

[2] strawman 
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci840566,00.html 

[3] refactoring 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919168,00.html

[4] initial extent
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci916333,00.html

[5] IT Crossword Puzzle: Malware 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916579,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])


:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Word of the Day":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://WhatIs.com/u
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to