Question

In: Computer Science

Awesome depiction of how to mitigate an attack on privacy and credit card information. Our text...

Awesome depiction of how to mitigate an attack on privacy and credit card information. Our text discusses attacking your own network. Many firms hire outside consulting firms to do just that.

Why hire outsiders to play a hacker and test our network?

What are the benefits and risks?

NMap 101: Fun With Firewalls! HakTip 102 (Links to an external site.) NMap 101: Fun With Firewalls! HakTip 102
Please respond in text format, no pictures or hand written. Also any reference sites thank you!

Solutions

Expert Solution

Outsiders are hired to play a hacker and test our network to check if our network is strong and secured enough or not. These types of hackers are called as ethical hackers or White Hat Hackers. They hack into the network but unlike unethical hackers they dont steal any information from the system or intend any kind of of harm to his/her empolyer. They learn and perform hacking in a professional manner, based on the direction of the client, and later, present a maturity scorecard highlighting their overall risk and vulnerabilities and suggestions to improve This kind of hacking is always important for every organisation's network else they will never know if their network is secure enough.

Benefits of this :

  • Discovering vulnerabilities from an attacker’s POV so that weak points can be fixed.
  • Implementing a secure network that prevents security breaches.
  • Helping protect networks with real-world assessments.
  • It also reveals various ways through which a hacker can get into your system.
  • Through this one can check his/her ability to deal if such breaches occur.
  • Reveals Problems in Your Current IT Spending.
  • Builds Trust with Your Customers.

Risks involved in this :

  • System malfucntioning because of the testing
  • System crash possibilities if it cant hold the testing pressure.
  • Possibility of data loss.
  • Trust on the hired ethical hacker that he/she does do something unethical.

Related Solutions

Explain how timestamping would be used in a protocol to mitigate replay attack.
Explain how timestamping would be used in a protocol to mitigate replay attack.
Credit Card Debt – How long will it take me to pay off my credit card...
Credit Card Debt – How long will it take me to pay off my credit card balance of $3,750? The credit card company is charging 10% interest. I can afford to pay $150/month, but would prefer to pay $100/month because I want to continue my cable service. Please show me the answer to both scenarios.
Explain the ethical standards in relation to storing credit card information on the network sever.
Explain the ethical standards in relation to storing credit card information on the network sever.
How does our use of the Internet make it difficult to protect individual privacy and intellectual...
How does our use of the Internet make it difficult to protect individual privacy and intellectual property? Identify two changes, either technical or behavioral, that you believe are crucial in order to improve this situation.
Discuss how HIPAA protects the privacy and confidentiality of patient information
Discuss how HIPAA protects the privacy and confidentiality of patient information
how does a penalty rate work on a credit card what is the liability for a...
how does a penalty rate work on a credit card what is the liability for a lost or stolen credit card what are you actions and steps to dispute an error on a billing statement distinguish between a single payment and an installment loan what's the difference between a secured and an unsecured loan? please provide examples
Create a Program Proposal for a program that deals with how ti mitigate stress. Information for...
Create a Program Proposal for a program that deals with how ti mitigate stress. Information for the following aspects of your program program should include: Title, Goals/Objective, Description, Evaluation, Justification, Duriation, Resources and Budget.
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
If you paid for the candy bar with a credit card, how would the transaction appear....
If you paid for the candy bar with a credit card, how would the transaction appear. What would be debited and what would be credited from the point of view of the buyer and the seller?
(Sociology) Choose ONE of the theories of deviance disucssed in our text and explain how the...
(Sociology) Choose ONE of the theories of deviance disucssed in our text and explain how the theory could be applied in the real world--use a SPECIFIC EXAMPLE of an action that would be considered deviant in our society and explain it using your chosen theory.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT