What alternative arrangement could a company employ to ensure security instead of using hackers?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Since there are several definitions of hacker that people use today, I'm going to define it and then answer your question. For the purposes of answering this question, a hacker is to be defined as someone who is not supposed to have access to your system, but for the fun of it has accessed your system. If this individual(s) identifies themselves to you, you might hire that person to help you understand your systems' and network's vulnerability.
Rather than hiring a hacker as defined above, you can hire any number of reputable firms to do a security assessment on your system. They typically perform a "gap analysis" - that is, tell you what the differences are between best practices and what you have implemented. In addition, there are reputable firms that perform "ethical hacking." That is, with your prior knowledge and approval, they will attempt to "break into" your networks and or systems. This can also be called "penetration testing."
MORE INFORMATION ON THIS TOPIC
The Best Web Links: Tips, tutorials and more.
Search400's targeted search engine: Get relevant information on security.
Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.
Read this Search400 Featured Topic: Secure your iSeries
Related Q&A from Carol Woodbury
Before changing password levels and upgrading operating systems on the AS/400, ensure the clients connecting to the NetServer do not need the old ...continue reading
Look in the audit journal (QAUDJRN) on the AS/400 for an authority failure message with the name of the library as the object name. Use the ...continue reading
When error messages arise concerning attempts to use a permanent system object without authority, find the source of the issue by looking for an AF ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.