Glossary Term
White hat (computer security)
History and Tactics of White Hat Hacking
- One of the first instances of ethical hacking was a security evaluation conducted by the United States Air Force on the Multics operating system.
- The evaluation revealed vulnerabilities in hardware, software, and procedural security.
- Ethical hacking includes attacking software and systems, scanning ports, and examining known defects.
- Tactics like email phishing, rummaging through trash, and setting up cloned test systems may be used.
- Long-term infiltration and social engineering are used to replicate real attack techniques.
- Other methods include disk and memory forensics, DoS attacks, and security scanners.
- The goal is to identify vulnerabilities and gain access to secure areas.
Legality of White Hat Hacking
Belgium:
- Belgium legalized white hat hacking in February 2023.
United Kingdom:
- Hacking is legal if the access to a system is authorized.
- Unauthorized access is an offense under the Computer Misuse Act.
- Penalties range from fines to imprisonment, depending on the severity of the unauthorized access.
- Even exposing vulnerabilities for the greater good is not a legal defense.
Employment in White Hat Hacking
- The United States National Security Agency offers certifications in ethical hacking.
- Certifications cover techniques and team management.
- Red teams are aggressor teams, while blue teams are defender teams.
- The agency recruits ethical hackers and considers past indiscretions.
- Ethical hackers bring benefits to enterprises by finding and fixing bugs.
Notable People in White Hat Hacking
- Tamer Şahin is a Turkish white hat hacker.
Related Concepts and References
- Bug bounty program
- IT risk
- MalwareMustDie
- Wireless identity theft
- References to further reading and resources on white hat hacking.