Ethical hacking: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson m (Add category.) |
imported>Doug Williamson (Expand heading.) |
||
Line 1: | Line 1: | ||
'' | ''Risk management - cybersecurity.'' | ||
Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity. | Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity. | ||
Line 13: | Line 13: | ||
* [[Ethical hacker]] | * [[Ethical hacker]] | ||
* [[Hack]] | * [[Hack]] | ||
* [[Cybersececurity]] | |||
[[Category:Manage_risks]] | [[Category:Manage_risks]] | ||
[[Category:Technology]] | [[Category:Technology]] |
Revision as of 15:45, 14 October 2020
Risk management - cybersecurity.
Attempting to legally gain access to computer systems for the purpose of identifying areas where organisations can improve their cybersecurity.
- Security review
- "Have a professional firm review your security, by carrying out attempted hacks – there are now many providers of this ‘ethical hacking’ service."
- The Group Treasurer: An ACT guide to the first 100 days, page 50.