Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Why Ethical Hacking is the New Face of Cyber Security

By Andrew Whitaker
enewscomputer
July 9, 2013

The job interview was going well when the young man made a confession: his printer was broken. Could he leave his resume on a thumb drive? That’s all it took. The thumb-drive didn’t just have PDF and Word files on it – the device contained a little snippet of malicious code that now, released onto one of the office’s secured computers, was hard at work multiplying itself. By the time the interviewee had returned to his car, the entire organization’s network security – its entire business – was compromised. You don’t expect to see hackers face-to-face, but in today’s world, hackers will go to any means necessary to gain access. Except this interview was different – the young man wasn’t a malicious hacker. In fact, his actions were sanctioned by the organization’s highest authorities – a hacker for hire employed for one purpose: to submit the company’s expensive security infrastructure to a real test.

Ethical hacking is a growing trend in cyber security – and for good reason. The average annual cost of cybercrime increased six percent in the last year, reaching $8.9 million for the average company. In 2010, McAfee estimated the global cost at $1 trillion. But costs aren’t just measured in dollars – they’re measured in downed services and lost connections, as well as stolen identities or personally identifiable information. In some cases, they can even be measured in lives. A Department of Defense (DoD) report released this year warned that a coordinated cyber attack could have a greater impact than a nuclear weapon. It’s no surprise, then, that last year, companies in the U.S. spent $5.3 billion on securing their infrastructure. But with so much effort being poured into security, and the stakes so high, organizations can’t wait to find out if its security program is effective until after an attack occurs. That’s where ethical hacking comes in.

To understand ethical hacking, you have to first understand hacking and how it has developed over the last decade. Too many people assume that hacking is still undertaken by young computer specialists whose first language is code – that’s no longer true. As basic computer systems have grown larger and more complex, they’ve opened themselves up to more vulnerabilities. At the same time, automated hacking tools have made even the most sophisticated attacks accessible to criminals.

Criminals, though, are just the tip of the iceberg. Media organizations are routinely targeted by “hacktivists” with a social or political agenda; technology companies are breached by overseas competitors; and governments are probed by foreign intelligence organizations. Some hackers in Britain have extorted financial institutions for money, while others – called “suicide hackers” – aim to bring down critical infrastructure, careless of money or punishment. Because hackers are a diverse group, organizations cannot assume that blanket information assurance policies or assessments will serve as a complete defense.

Ethical hackers mimic the behavior of real hackers – attempting to breach a system from a variety of directions. Their goal is to discover what intruders see on the target system, what they can do with that information, and if the organization can detect the intrusion. Even the most secure organizations have made ethical hacking a best practice. Since 2011, the DoD has been integrating cyber attacks into their war games. The ethical hackers are often so effective that they bring the war games to a complete halt.

Ethical hackers can be independent or a component of an existing cybersecurity firm. Their work begins only when client organizations have agreed to the test and all parties have signed agreements ensuring that any data discovered during the event is secure. Usually, only a few top managers at the organization are aware of the arrangement. When the details are worked out, ethical hackers start by researching the client organization, gaining critical information on its existing infrastructure. This can be achieved by probing networks remotely, stealing equipment or gaining access to a local network through social engineering like the thumb drive scenario outlined above. Once access is gained, hackers determine what kind of information they can obtain and the extent to which they can cause damage. At the end of the engagement, the hacking team develops a report detailing the results of the hacking activity, vulnerabilities and, most importantly, suggested prevention measures. 

After you lock the door to your house, you turn the knob to make sure it’s locked. Ethical hacking operates on the same principle. The more your organization invests in securing its information infrastructure, the more important it is to test that infrastructure through ethical hacking. What you find might surprise you – but it’s better to be surprised and have the ability to address the situation than it is to find your organization has been compromised. 

KEYWORDS: cybercrime Ethical Hacker malicious code penetration testing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Andrew Whitaker (M.Sc., CISSP, CEI, LPT, CEH, CEPT, CPT, CICP, CHFI, ECSA, CCNP, CCSP, CCVP, CCDP, CCNA:Security, CCDA, CCENT, LPIC-1, MCT, MCTS, MCSE, CNE, EMCPA, CTP, A+, Network+, Security+, Convergence+, Linux+, CEREA, WAPT, CSSA) is a nationally recognized expert on computer hacking, an author of best-selling networking and security books, and an award winning technical trainer. He is a contributing author to seven books, including being the lead author on Penetration Testing and Network Defense (Cisco Press) and Chained Exploits: Advanced Hacking Attacks From Start to Finish (Addison-Wesley). His work has gathered media coverage by the Wall Street Journal, NBC, The Philadelphia Inquirer, San Francisco Gate, Business Week Magazine, and others. He is a frequent conference speaker and has given talks at GFIRST8, DefCon, TakeDownCon, ChicagoCon, and SecurePhilly. He has over 18 years of experience in information technology, with 13 of those years focused on ethical hacking. He currently works as the Senior Manager of the Cyber Attack Penetration Division at Knowledge Consulting Group. His team conducts penetration test assessments for numerous high-profile federal agencies and commercial organizations.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker

    Why Ethical Hacking? (The What and Why of Ethical Hacking)

    See More
  • The Long and Winding Road to Cyber Recovery

    Security from the Start: Why Cyber Awareness is Critical at the Initial Stages of Business

    See More
  • Tariffs in block letters with China and USA behind

    Cyber as a Pressure Valve: Why Economic Conflict Is Fueling a New Era of Cyber Escalation

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!