You are here:
Publication details
Institut svolení poškozeného a etický hacking
Title in English | The consent of the injured party and the ethical hacking |
---|---|
Authors | |
Year of publication | 2018 |
Type | Article in Periodical |
Magazine / Source | Trestněprávní revue |
MU Faculty or unit | |
Citation | |
web | Repozitář MU |
Keywords | cybercrime; ethical hacking; the consent of the injured party; illegal access into computer system or memory device |
Attached files | |
Description | A key role in the fight against cybercrime is its prevention. Like owners of houses can protect their property against burglary with various protective measures (CCTV, safety doors), the owners of information systems can protect these systems with quality security measures. Relatively sophisticated way to find security gaps is engagement of ethical hackers. Ethical hacking can be qualified as a crime “illegal access into computer system and memory device” and consent of the injured party can be therefore used. This article is focused on three basic methods of ethical hacking and on their comparison with the conditions for the application of the consent of the injured party. |
Related projects: |