Thursday, 13 December 2012

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them?
  • Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.
  • Defending Hackers create Detection Systems to track attacking Hackers, while the attacking Hackers develop bypassing techniques, which are eventually resulted in bigger and better detecting and tracking systems. The net result of this interaction is positive, as it produces smarter people, improved security, more stable software, inventive problem-solving techniques, and even a new economy.
  • Now when you need protection from Hackers, whom you want to call, “The Ethical Hackers”. An Ethical Hacker possesses the skills, mindset, and tools of a Hacker but is also trustworthy. Ethical Hackers perform the hacks as security tests computer systems.
    • Ethical Hacking — also known as Penetration Testing or White-Hat Hacking —involves the same Tools, Tricks and Techniques that Hackers use, but with one major difference:
    • Ethical hacking is Legal.
    • Ethical hacking is performed with the target’s permission. The intent of Ethical Hacking is to discover vulnerabilities from a Hacker’s viewpoint so systems can be better secured. Ethical Hacking is part of an overall information Risk Management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.
    • As Hackers expand their knowledge, so should you. You must think like them to protect your systems from them.
    • Ethical Hacker, know activities attackers carry out and how to stop their efforts. They know what to look for and how to use that information to thwart Hackers’ efforts.

No comments:

Post a Comment