CEHv8 BOOTCAMP: MODULE 01-INTRODUCTION TO ETHICAL HACKING_SET-1 Flashcards
What is Hack Value?
The notion among hackers that is worth doing or is interesting.
What is Exploit?
A defined way to breach the security of an IT system through vulnerability.
What is Vulnerability?
Existence of a weakness, design, or implementation error that can lead to an unexpected and undersirable event compromising the security of the system.
What is Target of Evaluation?
An IT system, Product, or component that is identified/subjected to a required security evaluation.
What is Zero-Day Attack?
An attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability.
What is Daisy Chaining?
Hackers who get away with database ttheft usuallycomplete their task, then backtrack to cover their tracks by destroying logs, etc.
What are the 5 elements in Information Security?
- Confidentiality
- Integrity
- Availability
- Authenticity
- Non-Repudiation
What is Information Security?
A state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low or tolerable.
What 3 components can define level of security?
- Functionality
- Security
- Usability
What are 6 Information Security threats?
- Natural Threats
- Physical Threats
- Human Threats
- Network Threats
- Host Threats
- Application Threats
What are examples of Natural Threats?
- Floods
- Natural Disasters
- Earthquakes
- Hurricanes
What are examples of Physical Threats?
- Loss or Damage of system resources
- Physical intrusion
- Sabotage, espionage, and errors
What are examples of Human Threats?
- Hackers
- Insiders
- Social engineering
- Lack of knowledge and awareness
What are examples of Network Threats?
- Information gathering
- Sniffing and eavesdropping
- Spoofing
- Session hijacking and Man-in-the-Middle
- SQL injection
- ARP Poisoning
- Password-based attacks
- Denial of service attack
- Compromised-key attack
What are examples of Host Threats?
- Malware attacks
- Target Footprinting
- Password attacks
- Denial of service attacks
- Arbitrary code execution
- Unauthorized access
- Privilege escalation
- Back door Attacks
- Physical security threats