Ethical Hacking Flashcards
Attack
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Availability
Authorized personnel accessing the data at appointed times. Involves a comprehensive planning of hardware, software, facility, people, and connectivity.
CIA Triad
A model promoted to define and practice policies related to formation security; uses confidentiality, integrity, and availability.
Confidentiality
Keeping access to the information only to the intended audience; does two things: ensures that the right people get the intended information and prevents sensitive information from reaching the wrong people
Defense-in-depth
The use of layered mechanisms.
Exploit
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer.
External Testing
Focused on the server’s infrastructure and underlying software pertaining to the target; can be performed with no prior knowledge of the site or with full disclosure of the topology and environment
Hacking
The skill of exploring various security breaches and posting unwanted content on websites, stealing data, etc.; concentrates on exploits and vulnerabilities
Integrity
Maintaining the sanctity of information and keeping the data accurate throughout its life,
whether it is on the same computer or shared over a network