through public sources on the Internet. This test represents the most commonly perceived threat. A well-defended system should not allow this kind of intruder to do anything. A semi-outsider has limited access to one or more of the organization’s computers or networks. This tests scenarios such as a bank allowing its depositors to use special software and a modem to access information about their accounts. A well-defended system should only allow this kind of intruder to access his or her own account information. A valid user has valid access to at least some of the organization’s computers and networks. This tests whether or not insiders with some access can extend that access beyond what has been prescribed. A well defined system should allow an insider to access only the areas and resources that the system administrator has assigned to the insider.B. What is Ethical Hacking? Fig. 2 Ethical hacking. Ethical hacking is also known as “Penetration Hacking” or “Intrusion Testing” or “Red Teaming”.Ethical hacking is defined as the practice of hacking without malicious intent. the Ethical Hackers and Malicious Hackers are different from each other and playing their important roles in security .According to Palmer (2004, as quoted by Pashel, 2006): “Ethical hackers employ the same tools and techniques as the intruders, but they neither damage the target systems nor steal information. Instead, they evaluate the target systems’ security and report back to owners with the vulnerabilities they found and instructions for how to remedy them”. The vast growth of Internet has brought many good things like electronic commerce, email, easy access to vast stores of reference material etc. As, with most technological advances, there is also other side: criminal hackers who will secretly steal the organization’s information and transmit it to the open internet. These types of hackers are called black hat hackers. So, to overcome from these major issues, another category of hackers came into existence and these hackers are termed as ethical hackers or white hat hackers. Ethical hacking is a way of doing a security assessment. Like all other assessments an ethical hack is a random sample and passing an ethical hack doesn’t mean there are no security issues. An ethical hack’s results is a detailed report of the findings as well as a testimony that a