19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3: Developing Your Ethical Hacking Plan<br />

✓ How will ethical hacking improve security, IT, and the general business?<br />

✓ What information are you protecting? This could be personal health<br />

information, intellectual property, confidential client information, or<br />

employees’ private information.<br />

✓ How much money, time, and effort are you and your organization<br />

willing to spend on ethical hacking?<br />

✓ What specific deliverables will there be? Deliverables can include anything<br />

from high-level executive reports to detailed technical reports and<br />

write-ups on what you tested, along with the outcomes of your tests.<br />

You can deliver specific information that is gleaned during your testing,<br />

such as passwords and other confidential information.<br />

✓ What specific outcomes do you want? Desired outcomes include the<br />

justification for hiring or outsourcing security personnel, increasing<br />

your security budget, meeting compliance requirements, or enhancing<br />

security systems.<br />

After you know your goals, document the steps to get there. For example, if<br />

one goal is to develop a competitive advantage to keep existing customers<br />

and attract new ones, determine the answers to these questions:<br />

✓ When will you start your ethical hacking?<br />

✓ Will your ethical hacking be blind, in which you know nothing about the<br />

systems you’re testing, or knowledge-based, in which you’re given specific<br />

information about the systems you’re testing, such as IP addresses,<br />

hostnames, and even usernames and passwords? I recommend the<br />

latter.<br />

✓ Will this testing be technical in nature, involve physical security assessments,<br />

or even use social engineering?<br />

✓ Will you be part of a larger ethical hacking team, sometimes called a<br />

tiger team or red team?<br />

✓ Will you notify the affected parties of what you’re doing and when you’re<br />

doing it? If so, how?<br />

Customer notification is a critical issue. Many customers appreciate that<br />

you’re taking steps to protect their information. Approach the testing in<br />

a positive way. Don’t say, “We’re breaking into our own systems to see<br />

what information is vulnerable to hackers,” even if that’s what you’re<br />

doing. Instead, say that you’re assessing the overall security of your<br />

computer systems so the information will be as secure as possible.<br />

✓ How will you know whether customers even care about what you’re doing?<br />

✓ How will you notify customers that the organization is taking steps to<br />

enhance the security of their information?<br />

✓ What measurements can ensure that these efforts are paying off?<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!