ETHICAL HACKING: WHITE HAT HACKERS

Written by EVoting Communications / 15 de Julio del 2021

EVOTING HAS JUST SUCCESSFULLY COMPLETED ITS ANNUAL SECURITY SYSTEMS CHECKUP.

A few years ago, talk of hackers was associated with something negative. However, within the computer security community there are today several types of hackers, known as Black Hats, Gray Hats and White Hats.

Black Hats use hacking for financial gain, revenge or to cause trouble. Gray hats are somewhere in between, and hack sometimes for ideology or to stage hacktivist protests. Finally, white hats are IT professionals who help protect companies or individuals against possible cyber-attacks, developing penetration tests on their systems and software, seeking to detect flaws, evaluate solutions and strengthen security systems. These cybersecurity experts have become one of the most effective weapons against malicious hackers or “cybercriminals”. They practice what is called Ethical Hacking.

Why is ethical hacking important? “At EVoting, security is fundamental to the service we offer. For us, ethical hacking is vital when it comes to detecting possible vulnerabilities in our security systems and that is why we perform tests and penetration tests on an annual basis and receive a detailed report with the results,” explains Tomás Barros, EVoting’s General Manager.

In this context, the company underwent an ethical hacking process between March 29 and April 6, whose final report was delivered a week ago, and certifies that the vulnerabilities are fully mitigated. “In that sense we have an advantage because, as we have developed our own voting software, we can update, refine and adapt the security measures to the various requirements that arise,” concludes Barros.

At EVoting, the IT security measures are grouped into 5 areas: in addition to the annual ethical hacking, these include: 1. Academic support, in that all development is based on public algorithms the Academy has tested, approved and recognized; 2. A top-notch technical team that supervises all processes in real time; 3. Presence of multiple servers in different geographical areas, with real-time monitoring systems, alarms and automatic backup systems; 4. IP monitoring to limit the number of votes accepted per IP to avoid possible irregularities; 5. Various anti-hacking measures, such as hosting the entire platform on Amazon Web Services, with the highest standard in security and protection, and control of data storage and who can access it.

To learn more about Ethical Hacking, click here.