Professional Documents
Culture Documents
Mt hacker hp php s dng cc cng c qut cng nh Nmap, Nessus qut h thng ca
mnh v tm thy cng m. Cc l hng vi mi cng c th c nghin cu v bin php khc
phc c th c thc hin.
An ethical hacker will examine patch installations and make sure that they cannot be exploited
Mt hacker hp php s kim tra ci t bn v li v chc chn rng h khng th b khai thc
Ethical hacker is to evaluate the security of a network or system's infrastructure. It entails finding
and attempting to exploit any vulnerabilities to determine whether unauthorized access or other
malicious activities are possible
Hacker hp php l nh gi s an ton ca mt c s h tng mng li hoc h thng. N
i hi vic tm kim v c gng khai thc bt k l hng xc nh xem truy cp tri php
hoc hot ng c hi khc c th xy ra
The ethical hacker should help strengthen the security network of an organization and not use the
security information for his/her own advantage.
Cc hacker hp php s gip tng cng mng li an ninh ca mt t chc v khng s dng
cc thng tin bo mt cho li ch ca ring mnh
The ethical hacker should be involved in hacking only to identify the security issues with a
system and recommend solutions as a defense strategy
Cc hacker hp php nn tham gia vo "hack" ch xc nh cc vn an ninh vi mt h
thng v xut gii php nh mt chin lc quc phng