Reference no: EM132160275
Assignment - Review of the given article.
In order to discuss the pen-testing skills of an individual, the fact that this is such a very broad spectrum needs to be highlighted. A Pen-Test can be anything from simply observing or better known in the cyber-realm as "Performing Surveillance/Reconnaissance" to consciously attacking a network for the sole purpose of assessing how secure its applications are. As outlined in the "Certified Ethical Hacker All-in-One Exam Guide", there are 5 phases of ethical hacking. They are (Rahalkar, 2016): Reconnaissance Scanning and Enumeration Gaining Access Maintaining Access Covering Tracks Each of these phases, also have their own disciplines confined within them and in some cases they even overlap each other. In essence one factor is not dependent on the other, although it can be. As a matter of fact if done correctly and thoroughly, they should compliment each other. If we consider this from the perspective of the purpose of the pen-tester then we can identify a hierarchy of the skills necessary to accomplish the job.
According to the authors of Penetration Testing Essentials, "In the real world, you can categorize hackers to differentiate their skills and intent." (Oriyano, 2017) Oriyano categorizes these hackers as the following: Script Kiddies White Hat Hackers Gray-Hat Hackers Black-Hat Hackers Cyberterrorists For the purposes of this discussion, White-Hat Hackers will be considered the Pen-Testers and their purpose can be defined as hackers that follow a code of ethics and possess the skills necessary to attack as well as defend against malicious characters. Their ethics is what defines these White-Hat Hackers, that being said, it fits perfectly with Christian values. The end goal for the White-Hat Hackers is to give their assessment to the client that will benefit them in the long run. Once they stay within the lines of their code of ethics and remain true to their cause they will not compromise biblical ethics. The bible state "No one can serve two masters; for either he will hate the one and love the other, or he will be devoted to one and despise the other.
You cannot serve God and wealth."(Matthew 6:24, NASB) I bring this verse simply because it is cut and dry, either the hacker performs their duties within the scope or they don't.
References - Oriyano, S.-P. (2017). Penetration testing essentials. Indianapolis, Indiana: Sybex, a Wiley brand. Rahalkar, S. A. (2016). Certified Ethical Hacker (CEH) Foundation Guide. Berkeley, CA: Apress L. P. cp.