Week 1
Our first session introduced the foundations of ethical hacking, the legal practice of testing systems to find and fix security weaknesses before attackers do. Unlike malicious hackers, ethical hackers operate with permission and follow strict guidelines. This process is often referred to as penetration testing (pen testing).
Penetration Testing Models
We learned about three types of pen testing approaches:
-
White Box – Full system access is provided.
-
Black Box – No prior knowledge is given, simulating an external threat.
-
Gray Box – Partial system knowledge is shared.
These models help organizations understand their technical weaknesses and test how well their teams can respond to real threats.
Client Requirements & Business Goals
We also explored how pen testing must align with the client’s objectives and business needs. It's not just about finding vulnerabilities, it's about understanding:
-
What the client wants to protect.
-
How security impacts business operations.
-
The level of risk the organization is willing to accept.
By working with the client to define these goals, ethical hackers ensure that the testing is relevant, valuable, and focused on what matters most.
Comments
Post a Comment