Enlisting the young as white-hat hackers

Thursday, 29 May 2003, 4:22 PM EST

On a Wednesday evening, in an office suite appointed with Pentium II's and little else, 10 teenagers were doing Andrew Robinson's bidding. Fortified by pizza and soda, they studied a computer system's weaknesses, looking for ways to break in and steal information.

Mr. Robinson, 38, who runs a small information security company in nearby Portland, had less-than-nefarious plans in mind, however. His free after-school program is intended to teach teenagers the basics of ethical hacking, or protecting a company's computer system from attack by learning how to attack it yourself.

The program, called Tiger Team, named for the professional consultants who analyze system security risk, teaches young hackers to use their skills for good instead of evil. Working as two teams, the teenagers play a virtual game of capture the flag, trying to crack the other team's network and do damage while defending their own. An honor code keeps them from creating mischief outside their labs.

[ Read more ]




Spotlight

Best practices for ensuring compliance in the age of cloud computing

Here are the major considerations organizations should incorporate into their compliance programs, as well as pitfalls that can be avoided to ensure businesses stay compliant while using cloud computing.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Sep 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //