Chapter 30: Hacking in an Ethical Way

Jim Harmening     Cybersecurity & Risk Management, Illinois Commerce Commission, Chicago, IL, United States

Abstract

Ethical Hacking has become mainstream. University professors are doing research on many different sectors exposure to poorly secured computer code. Large hardware and software companies have internal threat hunting teams along with bug bounty programs that pay thousands of dollars in rewards. There is a public group called MITRE.ORG that creates and tracks Common Vulnerabilities and Exposures (CVEs) which is funded by the Department of Homeland Securities (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Take a shallow dive into what makes ethical hacking essential to our current ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.