When IT Officer try to bruitforce or attack the production system to find out vulnerability and collect those weakness send to Head of IT security without permission what this action fall in to?
Hacker34%
Ethical hacker69%
penetration testing33%
vulnerability scan8%
279 PARTICIPANTS
The key to the question for me was 'without permission'. If anyone in the organization is taking it upon themselves to attack a production system (even assuming noble intent) without explicit permission, it is hacking. Many organizations have 'Red' or 'Blue' teams who 'attack' internal systems to find weaknesses before adversaries do, but these are always sanctioned activities.