This document discusses ethical hacking and defines it as assessing a system's security vulnerabilities from the perspective of a hacker for legitimate purposes like security testing, with the owner's consent and without malicious intent. It outlines the types of hackers (black hat, white hat, grey hat), hacking process (footprinting, scanning, gaining access, maintaining access, covering tracks), why ethical hacking is needed (to protect from external attacks), and its advantages (finding security holes, preventing attacks) and disadvantages (requires trustworthy professionals which can be expensive).