Ethical Hacking Flashcards
What is Ethical Hacking?
An authorised attempt to gain unauthorised access to a computer system, application or data.
What does the term “Cracker” Mean?
A hacker who uses their skills and toolset for destructive or offensive purposes.
What is the purpose of a security professional?
To test their network and systems security for vulnerabilities using the same tools that may be used against them in an offensive attack.
What is a White Hat Hacker?
An ethical hacker is a security expert employed by a company to carryout penetration testing without malicious intent.
What is a Grey Hat Hacker?
A blend of both black hat and white hat hacking. Their intention is not inherently malicious.
What is a Black Hat Hacker?
Unethical hackers who break into computer networks with malicious intent.
What are the Phases of ethical hacking?
1- Reconnaissance
2- Scanning
3- Gaining Access
4- Maintaining Access
5- Covering Tracks
What is Cyber Resilience?
How quickly and efficiently a person or company can recover from a cyber attack.
What are the elements of security?
1- Confidentiality (Inception - unauthorised access).
2- Integrity (Modification of data).
3- Availability (Interpretation of service).
What is reconnaissance?
The act of gathering preliminary data or intelligence on a specific target.
What is active reconnaissance?
In active recon the hacker engages directly with the target.
What is passive reconnaissance?
Non direct engagement with the target recon is preformed through an intermediary.
What are the reasons for hacking?
1- Sabotage - DOS/DDOS.
2- Fraud/Forgery - Financial theft, extortion/sextortion.
3- Hacktivist - Socially/ Politically motivated crime.
4- Publicity - To publicly demonstrate hacking skills by exposing security vulnerabilities
5- Curiosity - To uncover secret
government/organisational knowledge.
What are the different types of cyber attacks?
1- Buffer overflow. 2- Denial of service/distributed denial of service (DOS/DDOS). 3- Brute force password attacks. 4- Back doors and trojans. 5- Man in the middle. 6- Rogue access point. 7- VLAN hopping. 8- Social engineering.
What are the Computer Misuse Act fundamentals?
1- Unauthorised access to computer material.
2- Access to computer material with malicious intent.
3- Intent to impair computer operations.
4- Hacking and spreading viruses.
5- Only when you delete, move or copy a file have you committed an offence.
6- Obtaining details through criminal means.