Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
White hat (computer security)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Employment== {{Globalize|article|USA|2name=the United States|date=June 2011}} The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.<ref name=Secpoint /> When the agency recruited at [[DEF CON]] in 2020, it promised applicants that "If you have a few, shall we say, ''indiscretions'' in your past, don't be alarmed. You shouldn't automatically assume you won't be hired".<ref>{{Cite web |url=http://www.nsa.gov/careers/dc20 |title=Attention DEF CONยฎ 20 attendees |year=2012 |publisher=National Security Agency |archive-url=https://web.archive.org/web/20120730224626/http://www.nsa.gov/careers/dc20 |archive-date=2012-07-30}}</ref> A good "white hat" is a competitive skillful employee for an enterprise since they can be a [[countermeasure]] to find the [[bug (engineering)|bugs]] to protect the enterprise network environment. Therefore, a good "white hat" could bring unexpected benefits in reducing the risk across systems, applications, and endpoints for an enterprise.<ref>{{Cite journal|last=Caldwell|first=Tracey|date=2011|title=Ethical hackers: putting on the white hat|journal=Network Security|volume=2011|issue=7|pages=10โ13|doi=10.1016/s1353-4858(11)70075-7|issn=1353-4858}}</ref> Recent research has indicated that white-hat hackers are increasingly becoming an important aspect of a company's network security protection. Moving beyond just penetration testing, white hat hackers are building and changing their skill sets, since the threats are also changing. Their skills now involve [[Social engineering (security)|social engineering]], mobile tech, and [[social networking]].<ref>{{Cite journal |last=Caldwell |first=Tracey |date=2011-07-01 |title=Ethical hackers: putting on the white hat |url=https://www.sciencedirect.com/science/article/pii/S1353485811700757 |journal=Network Security |volume=2011 |issue=7 |pages=10โ13 |doi=10.1016/S1353-4858(11)70075-7 |issn=1353-4858|url-access=subscription }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)