1 - Ethical Hacking Concepts Flashcards
Define an ethical hacker
Ethical hackers conduct penetration tests for companies. Companies sometimes hire ethical hackers to break into the company’s network to find the weakest link in the network or network system.
Define a security hacker
Security testers do more than attempt to break in; they analyze the company’s security policy and procedures and report any vulnerability to management.
What are the penetration testing methodologies?
White Box Model
Black Box Model
Gray Box Model
What is a white box Model
The tester is told what network topology and technology the company is using and is given permission to interview IT personnel and company employees.
EG. the company might print the tester a network diagram showing all the company’s routers, switches, firewalls and IDSs.
What is a black box model
Opposite of white box. Management don’t tell their staff a penetration test is being conducted. Nor do they give the tester any diagrams or describe what technologies the company is using. Management want to see the security tester’s ability to detect an attack.
What is a Gray box model
Hybrid of white and black. Company gives tester partial information.
EG. they might get information about which Oss are used but not get an network diagrams.
What can you do legally?
Laws involving computer technology change as rapidly as technology itself, keep abreast of what’s happening in your area.
Laws vary from state to state and country to country – You should be aware of what these are.
What can’t you do legally?
You cannot carry out illegal actions such as:
- Accessing a computer without permission
- Destroying data without permission
- Copying information without permission
- Installing works or viruses
- Denying users access to network resources