avatarDr Mehmet Yildiz

Summary

The provided content discusses the critical role of cybersecurity and ethical hacking in safeguarding digital ventures, emphasizing the importance of security expertise, ethical hacking practices, and the comprehensive skill set required for ethical hackers to protect digital assets and maintain privacy.

Abstract

The text outlines the necessity for digital ventures to prioritize cybersecurity within their strategic planning. It underscores the broad scope of cybersecurity, touching upon identity management, authentication, and authorization. The author highlights the significance of ethical hacking as a proactive measure to identify and address vulnerabilities before they can be exploited by criminal hackers. Ethical hackers are portrayed as essential contributors to a venture's digital intelligence, requiring a deep understanding of system architecture, industry knowledge, core security competencies, analytics, technical capabilities, and interpersonal skills. The article also emphasizes the ethical hacker's role in compliance, incident management, and contributing to the overall health and innovation of digital ventures.

Opinions

  • Cybersecurity is an integral aspect of digital business operations, encompassing a wide range of security management areas.
  • Ethical hacking is presented as a countermeasure to criminal hacking, with ethical hackers needing to be more knowledgeable and skillful than their malicious counterparts.
  • The author suggests that ethical hackers must possess a comprehensive set of skills, including understanding of system architecture, industry awareness, security expertise, analytics, and technical capabilities.
  • Interpersonal skills are highlighted as a key differentiator for ethical hackers, enabling them to effectively communicate with stakeholders and contribute positively to business processes.
  • The article conveys the opinion that ethical hackers should be involved in the innovation process, offering their security insights to help create more resilient solutions.
  • The author advocates

ILLUMINATION Book Chapters

Digital Intelligence — Chapter 13

Leveraging Ethical Hacking for Cybersecurity Requirements of Digital Ventures

Photo by Max Bender on Unsplash

Chapter 1, Chapter 2, Chapter 3, Chapter 4, Chapter 5, Chapter 6a, Chapter 6b, Chapter 7a, Chapter 7b, Chapter 8, Chapter 9, Chapter 10, Chapter 11, Chapter 12, Chapter 13, Chapter 14, Chapter 15, Chapter 16, Chapter 17, Chapter 18, Chapter 19, Chapter 20, Chapter 21

Like any business organization, digital ventures need to include cybersecurity in their business vision, mission, strategy, and operational tactics to survive and thrive. This is a broad topic but I provide essential considerations for technology leaders responsible for the success of digital ventures.

Every aspect of technology and online business relates to cybersecurity. It is a particular interest in Cloud Computing, IoT, Mobility, Big Data, and analytics services.

Even though this chapter is about cybersecurity, the principles also apply to overall Technology security. My aim is to create awareness for security and privacy which are tightly related topics. When security is compromised, privacy is most likely conceded too. For example, a minor security issue caused millions of Facebook account details to leak to the public domain recently.

Cybersecurity is a massive security domain and touches every aspect of security management, including identity management, authentication, authorization, and several other areas.

Related to advanced business and technology security, emerging blockchain initiatives unfold critical security requirements that digital ventures should consider.

Apart from adding appropriate measures for security, digital ventures should also consider the concept of ethical hacking to increase security intelligence and contribute to the overall digital intelligence of ventures.

The purpose of ethical hacking in digital ventures is to identify vulnerabilities in the systems, tools, and solution building blocks.

Early identification of vulnerabilities and resolving them promptly require deep security and cybersecurity expertise for ventures. The security team members need to take ethical hacking education and practice their learning in the workplace.

Ethical hacking requires broad security knowledge and technical specialty in several domains. For example, security functions such as authentication, authorization, accounting, and auditing are critical functions for introducing an ethical hacking process in the venture.

Ethical hacking is an antidote to criminal hacking.

Criminal hackers manipulate data, information, knowledge, assets, money, and the reputation of people and organizations for various purposes.

As opposed to criminal hackers, ethical hackers empower business processes and people. They improve conditions, resolve security issues, address vulnerabilities, and reduce the risk of threats.

To achieve these critical goals, ethical hackers must be more knowledgeable and skillful than criminal hackers. Some professional, ethical hackers are more knowledgeable and skilled than criminal ones. In other words, ethical hackers must outsmart criminal hackers to serve digital ventures.

Ethical hackers use various security management tools. One of the prominent tools is the packet analyzer, aka sniffer, in the technology sector and security communities. A sniffer can be software or an appliance intercepting packets in the network and capturing network traffic as communication packets.

Digital ventures may need an ethical hacking process for auditing and corrective actions to meet rigorous industry compliance requirements.

The ethical hacking process covers six broad domains and expertise in digital ventures from my experience in the field. They are architecture and design expertise, industry awareness, core security expertise, analytics, technical capability, and interpersonal and business stakeholder expertise.

I want to touch on each domain and expertise within the ethical hacking context. The purpose is to guide the capability requirements of ethical hackers in digital ventures.

Ethical hackers are technical specialists. However, they need to understand system architecture and design constructs. Awareness of architectural governance schemes is crucial for ethical hackers. They must be capable of seeing the big picture in the venture.

Knowledge of the business processes, consumption model, application landscape, data platforms, and practices helps them to see the big picture.

Industry knowledge and expertise are also critical to seeing the big picture. They need at least to understand the rules and regulations in venture industries.

In addition to the big picture, ethical hackers also need to dive deep into details of comprehensive security and cybersecurity components. Their expertise must cover all components, and their skills must be up-to-date. An awareness of security issues and threats at the global level is a must.

Analytics is an essential cybersecurity function. To this end, ethical hackers must be capable of analyzing systems, hosting infrastructures, networks, design solutions, business applications, data, and databases. These areas require a sharp eye for detail.

Digital ventures consist of many applications written in various programming and scripting languages. Thus, ethical hackers should be able to understand coding and scripting for languages used in the venture’s applications.

They need to possess core hacking techniques such as sniffing, scanning, reverse engineering, disk and memory forensics, and vulnerability analysis.

Knowledge of operating systems is also essential. Many ventures use multiple operating systems proprietary as well as common ones such as Linux, Windows, Unix, ZoS, Android, macOS, and iOS.

Every digital venture has a network and is connected to several other networks. Thus, networking and internet-working skills are critical for ethical hackers.

They need to understand network protocols, wireless protocols, network architecture, infrastructure frameworks, network application patterns, network devices, networking functions, network management tools, connectivity flows, mobility, data communications, and integration of local and wide area networks.

Data is bread and butter for digital ventures. Hence, ethical hackers must find effective ways to deal with data sets from many angles. They need to understand data platforms, practices, storage, data lakes, data lifecycle management, databases, information processing, and expert knowledge systems, especially in artificial intelligence initiatives.

Besides, these specialists must possess skills for dealing with Big Data and analytics in growing ventures, especially for special forensic investigations.

Mobility is embedded in digital ventures. Ethical hackers must understand the digital technologies, mobile networks, and mobile workflows in the venture’s networks, including their protocols and device relationships.

Ethical hackers have a broad understanding of the mechanisms and implications of emerging technology stacks such as IoT (Internet of Things), Cognitive Computing, Cloud Computing, Edge and Fog Computing, Artificial Intelligence, and Big Data Analytics.

The key differentiating factor of ethical hackers from criminal hackers is their interpersonal skills. These talents must be of a caring, trustworthy, and reliable nature. As opposed to criminal hackers, ethical hackers must empathize with employees, sponsors, and consumers. They need to act non-judgementally and be approachable to people, always guiding for corrective actions.

Digital ventures can have multiple stakeholders at different levels. Ethical hackers must have exceptional stakeholder management skills. They should be able to communicate at all levels and speak the business language rather than technical jargon. Business stakeholders expect them to articulate risks, issues, and dependencies at technical and business levels.

In these ventures, ethical hackers work with the technical team and liaise with project managers, product owners, legal departments, and business executives. Understanding the processes, methods, and tools of projects is essential for ethical hackers.

Ventures may need urgent assistance, guidance, and action in critical situations. This is called incident management.

Thus, as most skilled security experts, ethical hackers focus on incidents urgently and spend very little time in problem management, which includes root cause analysis for resolution. During critical incidents, they rapidly identify risks, issues, and dependencies and only contribute to problem management after the incidents are resolved.

Finally, sponsoring executives in digital ventures may need the input of ethical hackers to create new solutions in the invention and innovation process.

To conclude, security and particularly cybersecurity, is a critical business factor in digital ventures.

The ethical hacking process and leveraging the necessary capabilities of ethical hackers can help the ventures address incidents, resolve the problems, prevent threats, and produce with an innovative mindset iteratively and consistently.

Thank you for reading my perspectives.

Other chapters

Chapter 1, Chapter 2, Chapter 3, Chapter 4, Chapter 5, Chapter 6a, Chapter 6b, Chapter 7a, Chapter 7b, Chapter 8, Chapter 9, Chapter 10, Chapter 11, Chapter 12, Chapter 13, Chapter 14, Chapter 15, Chapter 16, Chapter 17, Chapter 18, Chapter 19, Chapter 20, Chapter 21

Book cover by Dr Mehmet Yildiz

ILLUMINATION Book Chapters is edited by Claire Kelly, Ntathu Allen, Karen Madej, Britni Pepper, Thewriteyard, Maria Rattray, Dr. Preeti Singh, John Cunningham. If you want to contribute as an editor please contact me.

If you have books or manuscripts and own copyrights, please contact us by sending a request with your Medium account ID to contribute to ILLUMINATION Book Chapters. We will publish your book chapters in story format. Leveraging this initiative not only generates passive income, but you also can gain new readers.

Sample Stories for New Readers

In addition to my full-time consultancy job, I am a prolific writer with 40+ years of experience and the author of multiple books. I write on eclectic topics. Writing is my passion and hobby giving me therapeutic and monetary value.

Here is a short list to give you a quick taste of my recent stories.

Five Steps to Mental Clarity for Busy People

I Don’t Make Money by Selling My Time Anymore for Three Reasons

How I Perceive the 50th Century

Sugar Paradox: Key to Solve Metabolic and Mental Health Disorders

Cholesterol Paradox and How It Impacted My Health Positively

Three Tips to Boost Nitric Oxide and Lower Heart Disease/Stroke Risks

Why 442 Million People Live Diabetic and What We Can Do About it

Hormonal Intelligence: Sharpen It to Achieve Optimal Health

How to Write Content Guaranteed to Get Views and Reads

Even Full-Time Workers Can Be Prolific Writers.

I wish I had Gone Self-Employed 40 Years Ago for Three Reasons.

Ten Hobbies Enhanced the Quality of My Life over the Past Five Decades

Activate Self-Healing with Self-Love

What Would Happen if We Set Healthy Boundaries for Emotional Maturity?

An Overweight Man Called Me “Crazy & Freak” in the Butcher Shop Today

I wrote about nutrients like citrulline malate, biotin, lithium orotate, alpha-lipoic acid, n-acetyl-cysteine, acetyl-l-carnitine, CoQ10, NADH, TMG, creatine, choline, digestive enzymes, magnesium, hydrolyzed collagen, nootropics, pure nicotine, activated charcoal, Vitamin B12, Vitamin B1, Vitamin D, Vitamin K2, and other nutrients that might help to improve health and fitness.

Disclaimer: This post does not include health or professional advice. I only documented my reviews, observations, experience, and perspectives to provide information. If you have disease symptoms, please consult your healthcare professionals. Health is the responsibility of individuals.

About the Author

Thank you for subscribing to my content. I share my health and well-being stories in my publication, Euphoria. If you are new to Medium, you may join by following this link.

You may also join my seven publications on Medium as a writer requesting access via this weblink.

I write about health as it matters. I believe health is all about homeostasis. I share important life lessons from people in my professional and social circles.

Index of ILLUMINATION Book Chapters

Technology
Cybersecurity
Security
Books
Self Improvement
Recommended from ReadMedium