Abstract

This chapter discusses the different types of computer hackers as well as what role they play within this field, such as black hat hackers, white hat hackers, and gray hat hackers. The difference between is that white hat hackers are those individuals who perform security assessments within a contractual agreement, whereas black hats are those individuals who conduct unauthorized penetration attacks on information systems. The chapter further discusses For real advances in ethical behavior within information security, the combination of mandatory and community-supported ethics requirements across the entire range of the corporate world, the management support structure, and the engineers who design and support the communication and data infrastructure is needed. There has been an effort to try and codify the ethical responsibilities of information security specialists to provide employers and those who hire contractors an understanding of how their confidential data will be handled during penetration tests.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call