翻訳と辞書
Words near each other
・ White Hand Gang
・ White hand sign
・ White Hands Campaign
・ White Hart
・ White Hart Field
・ White Hart Halt railway station
・ White Hart Hotel, Harrogate
・ White Hart Inn, Crawley
・ White Hart Lane
・ White Hart Lane Community Sports Centre
・ White Hart Lane railway station
・ White Hart, Bishopsgate
・ White Hart, Grays
・ White Hassle
・ White hat
White hat (computer security)
・ White hat bias
・ White Haven
・ White Haven, Montana
・ White Haven, Pennsylvania
・ White hawk
・ White Head Formation
・ White Head Island
・ White Heart
・ White Heart (album)
・ White Heart discography
・ White Heat
・ White Heat (1926 film)
・ White Heat (book)
・ White Heat (disambiguation)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

White hat (computer security) : ウィキペディア英語版
White hat (computer security)

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing.
White-hat hackers may also work in teams called "sneakers", red teams, or tiger teams.
==History==
One of the first instances of an ethical hack being used was a "security evaluation" conducted by the United States Air Force of the Multics operating systems for "potential use as a two-level (secret/top secret) system." Their evaluation found that while Multics was "significantly better than other conventional systems," it also had "... vulnerabilities in hardware security, software security and procedural security" that could be uncovered with "a relatively low level of effort." The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.〔
By 1981 ''The New York Times'' described white hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated that "The Company realizes the benefit to NCSS and in fact encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files".
The idea to bring this tactic of ethical hacking to assess security of systems was formulated by Dan Farmer and Wietse Venema. With the goal of raising the overall level of security on the Internet and intranets, they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called Security Administrator Tool for Analyzing Networks, or SATAN, was met with a great amount of media attention around the world in 1992.〔

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「White hat (computer security)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.