- Ethical hackers tries to answer:
- What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)
- What can an intruder do with that information? (Gaining Access and Maintaining Access phases)
- Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)
- If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.
0 comments:
Post a Comment