Google News
Ethical Hacking - Interview Questions
What are the key concepts of ethical hacking?
Hacking experts follow four key protocol concepts :
* Stay legal. Obtain proper approval before accessing and performing a security assessment.

* Define the scope. Determine the scope of the assessment so that the ethical hacker’s work remains legal and within the organization’s approved boundaries.

* Report vulnerabilities. Notify the organization of all vulnerabilities discovered during the assessment. Provide remediation advice for resolving these vulnerabilities.

* Respect data sensitivity. Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement, in addition to other terms and conditions required by the assessed organization.