#

About us page

A security researcher looking for vulnerabilities in products, applications, or web services is considered an ethical hacker if he or she responsibly discloses those vulnerabilities to the vendors or owners of the targeted research. However, the same type of “research” performed by someone who then uses the same vulnerability to gain unauthorized access to a target network/system would be considered a nonethical hacker.

A security researcher looking for vulnerabilities in products, applications, or web services is considered an ethical hacker if he or she responsibly discloses those vulnerabilities to the vendors or owners of the targeted research. However, the same type of “research” performed by someone who then uses the same vulnerability to gain unauthorized access to a target network/system would be considered a nonethical hacker.


mission

To facilitate effective intergovernmental relations for consolidating and deepening devolution through consultation, cooperation, and coordination to achieve socio-economic development.

Core Value

To achieve its mission and vision, the Committee is committed to the following core values: -

  • Professionalism
  • Accountability
  • Impartiality
  • Transparency
  • Integrity
  • Opening Hours

    • Monday - Friday 8.00-5.00
    • sartuday & sunday Closed