Ethical Hacking Laws and Legal Boundaries Explained