Benefits Of Ethical Hacking

867 Words2 Pages

a) Ethical Hacking
Ethical hacking also known as Penetration Testing it is the use of programming skills to determine vulnerabilities and weaknesses in computer systems by using the same methods as the malicious hackers.
Benefits of Ethical Hacking for an Organization
 Having a computer that prevents malicious hackers from gaining access and safeguard system.
 Having adequate preventative measures in place to prevent security breaches
 To safeguard user or customer information available in business transactions and visits.
 Ethical hacking supports efforts to have more information about the organization’s system security so this helps to better the organization’s efforts to strengthen security measures against malicious hackers.
Implementation …show more content…

It can be used in the detection and prevention of crime and any dispute where evidence is stored digitally. In addition computer forensics auditing can be prepared in order to prosecute a party for fraud or negligence.
DIGITAL PREPARATION PROCEDURE
READINESS
This stage is important and it is mostly overlooked or left out in the digital preparation process or procedure. In this stage readiness comprises of suitable training, consistent testing and verification of software and equipment, understanding of rules of the court of law, dealing with unforeseen issues and making sure that the on-site acquisition kit is in proper working order.
EVALUATION
This here stage includes delivery instructions, the interpretation of those instructions if they are vague, risk analysis and the distribution of roles and resources. Risk analysis for law enforcement may include an assessment on the possibility of physical risk on entering a perpetrator’s property and how to deal with it efficiently. …show more content…

The investigator should keep in mind that the key or password may be stored elsewhere on the computer or on another one which the perpetrator has had access to. It can be within the volatile memory of a computer (also called RAM) which is usually when a computer shuts down, another reason to consider using live acquisition (to make changes or additions to the state of the computer which was not present before the perpetrator’s actions.
New Technologies
Computing keeps evolving each and every day with new software, hardware and operating systems emerging constantly. An examiner cannot be an expert in all areas even though they may need to analyse something that they haven’t previously encountered. In this case the examiner should be well prepared and gain knowledge to test and experiment with how new technologies behave. Examiners should share knowledge about technologies so that they stay up to date with the new ones.
Increasing Storage Space
A computer holds greater amounts of data, which for the investigator means that their analysis computers need to have sufficient processing power and available storage capacity to efficiently deal with searching and analysing large amounts of

Open Document