Ask the Expert

Alternative to using hackers

What alternative arrangement could a company employ to ensure security instead of using hackers?

Since there are several definitions of hacker that people use today, I'm going to define it and then answer your question. For the purposes of answering this question, a hacker is to be defined as someone who is not supposed to have access to your system, but for the fun of it has accessed your system. If this individual(s) identifies themselves to you, you might hire that person to help you understand your systems' and network's vulnerability.

Rather than hiring a hacker as defined above, you can hire any number of reputable firms to do a security assessment on your system. They typically perform a "gap analysis" - that is, tell you what the differences are between best practices and what you have implemented. In addition, there are reputable firms that perform "ethical hacking." That is, with your prior knowledge and approval, they will attempt to "break into" your networks and or systems. This can also be called "penetration testing."


The Best Web Links: Tips, tutorials and more.

Search400's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Search400 Featured Topic: Secure your iSeries

This was first published in August 2002

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: