In-depth

Getting inside the minds of ethical hackers

Dan Hatch gets to know some ethical hackers, learning what makes them tick and how they can help businesses by attacking them.

It was a stealth attack.

It was deliberately targeted, frighteningly fast, disturbingly easy and alarming for its potential not just to bring a multi-million pound global company to its knees but also for the chaos it could have caused the company's millions of clients worldwide.

It took just two hours for hackers to access every single file on every single computer including the credit card information of every single client of a company worth 800 million pounds a year.

This wasn't Sony. And this wasn't some shady, underworld hacking ring, penetrating the company's IT security for either financial gain or glory. This hack was done from the comfort of a seaside office on England's south coast.

Advertisement
Advertisement - Article continues below

It was done using nothing more than a PC and an internet connection, and the men who did it were paid to do it by the very company they were hacking into.

Welcome to the world of ethical hacking: the simulation of criminal attacks on an organisation's systems, premises, or people or a combination of all three with the written legal permission of all parties involved. It's all done to determine vulnerabilities which could be exploited by an attacker with criminal intent.

In a world where companies are grappling with the IT security challenges presented by modern computing, the cloud, social networking, consumerisation and mobility and where even the most high-profile and presumably tech-savvy companies like Sony can be hacked and have their embarrassment aired for all to see ethical hackers are increasingly being seen as the professionals to turn to.

"Most successful attacks are a combination of unfortunate mistakes on the part of the victim," ethical hacker Peter Wood (below) explains.

"So in the example of RSA and in the example of Sony, it won't be one mistake. It might look like that, it might be what the press might portray, but actually it will be a cascade of mistakes that portray a systemic problem with the victim."

Ethical hacker 2
Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/security/cyber-security/354246/millions-of-text-messages-leaked-through-exposed-truedialog-server
cyber security

Millions of text messages leaked through exposed TrueDialog server

2 Dec 2019