Ataque controlado

Ver:

·         Pruebas de penetración

·         Escáner de vulnerabilidades

Ataque controlado

Ataque a un sistema autorizado y controlado por el propietario del sistema. Tiene como objeto adelantarse a ataques reales para descubrir vulnerabilidades antes de que sean explotadas.

Hacking Ético

Se denomina a la realización de un análisis de seguridad de una infraestructura TIC ayudándose de técnicas de hacking, su finalidad es la realización de ataque controlados cuyo fin es conocer la seguridad de los sistemas y aplicaciones, así como los fallos o brechas de seguridad para que puedan ser corregidas.

http://www.inteco.es/glossary/Formacion/Glosario/

(en) White hat

White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it can be taken advantage by others (such as black hat hackers.) Methods of telling the owners about it range from a simple phone call through sending an e-mail note to a Webmaster or administrator all the way to leaving an electronic "calling card" in the system that makes it obvious that security has been breached.

http://searchsecurity.techtarget.com/

(en) ethical hacker

An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.

http://searchsoftwarequality.techtarget.com/glossary/

(en) White Hat

A white hat is a computer hacker who works to find and fix computer security risks. White hat consultants are often hired to attempt to break into their client's network to see if all security holes have been addressed.

http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas

Temas relacionados

Términos