In: Computer Science
There are several models for ethical hacking that allow for effective penetration testing. Depending on the need of the company, a given penetration tester may choose to use all or one of these methods. Research White Box, Black Box, and Gray Box penetration testing models, and describe how each can be used to protect companies from black-hat hacking attempts.
White box testing:
It is mainly for the testing the product for the bugs and defects.
It is one of the tedious type of testing.
It cannot be used for the viral attacks and ensure strength of the product.
It removes bugs and defects then it causes tough for the black hat hackers to intrude in any way to the system.
Black box testing:
He or she does not need to have knowledge on the internal codes.
It takes very less time.
The overall execution can only been checked here.
Hidden errors are not discovered.
Overall execution can be controlled in one point and has to be hide from hackers.
Gray Box testing:
Inner coding knowledge is very important.
It is also called as translucent testing.
Performed by clients, testers and developers.
Clients has to use the product with a specific key and not to be enclosed outside for hackers.
Please rate it if the above solution helps you in any way or if you have any concerns comment it, I will help you through again.