When IT Officer try to bruitforce or attack the production system to find out vulnerability and collect those weakness send to Head of IT security without permission what this action fall in to?

Hacker34%

Ethical hacker69%

penetration testing33%

vulnerability scan8%

279 PARTICIPANTS
2.1k viewscircle icon1 Comment
Sort by:
CIO2 years ago

The key to the question for me was 'without permission'.  If anyone in the organization is taking it upon themselves to attack a production system (even assuming noble intent) without explicit permission, it is hacking.  Many organizations have 'Red' or 'Blue' teams who 'attack' internal systems to find weaknesses before adversaries do, but these are always sanctioned activities.

Content you might like

Not at all8%

Minimally60%

Moderately23%

Significantly9%

Not sure

View Results

I am very confident my organization would be able to both architect and deploy a virtual network using self-service tools/portals15%

I am confident my organization would be able to deploy a virtual network, but less confident we would be able to architect it ourselves63%

I am confident my organization would be able to architect a virtual network, but less confident on the ability to deploy it ourselves11%

I am somewhat confident, but may require some guidance from a consultant or our service provider4%

I am not confident and would expect to engage with a partner or service provider5%

View Results
When IT Officer try to bruitforce or attack the production system to find out vulnerability and collect those weakness send to Head of IT security without permission what this action fall in to? | Gartner Peer Community