What Is Ethical Hacking and How Does It Work?