Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.
👉 Get written permission from the owner of the computer system and/or computer network before hacking.
👉 Protect the privacy of the organization been hacked.
👉 Transparently report all the identified weaknesses in the computer system to the organization.
👉 Inform hardware and software vendors of the identified weaknesses.
0 Comments