In present world, information security is one of the most important aspects in the world of information and technology. Over a period of time, especially since last two decades computing and all time availability and flow of information, there has been increase in the level of threat in terms of information breach or other malicious attempt to destroy information, that is why it has become highly important to ensure protection and security to all type of critical information (Caldwell, 2011, pp.10-13). There are certain techniques and components which are used to ensure protection for systems which are interconnected protect interconnected systems and more importantly, the data and information which is being used by such interconnected systems. It can be said that the concept of information security revolves around three basic aspects of information which is confidentiality, integrity, and availability of the information. Over a period of type an interesting concept has developed related to information system security known as “white hat” hacking. This concept is an innovative and interesting approach towards fight against keeping the negative or in simple words ‘bad guys’ away from getting access to sensitive information (Verton, 2002).