O'Reilly logo

Hacking For Dummies® 3rd Edition by Kevin Beaver

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part VI. Ethical Hacking Aftermath

Ethical Hacking Aftermath

In this part . . .

Now that the hard — or at least technical — stuff is over with, it's time to pull everything together, fix what's broken, and establish some good information security practices to move forward with.

First, this part covers reporting the security vulnerabilities you discover to help get management buy-in and hopefully more budget to make things right. This part then covers some good practices for plugging the various security holes within your systems and patching everything up to keep from being attacked. Finally, this part covers what it takes to manage change within your security systems for long-term success, including outsourcing ethical hacking so you can add even more projects to your overflowing plate! That's what working in IT and compliance is all about anyway, right?

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required