
With this in mind, companies are advised to cultivate (or perhaps contract with)
a group of people who make it their business to act as the hostile outsider, and
afford them ample opportunity to use these “hacker tools” against company systems
and services. In using these tools and staying abreast of the latest security advisories,
companies will be far better prepared to defeat the intruder at his own game.
Without such a strategy in place, their security will be tested, and not necessarily by
someone who has their best interests at heart.
The Five Phases of Hacking
Contrary to popular opinion and the sensationalized Hollywood image of the
hacker,