IA - Ethical Hacking Flashcards
is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable
Security
identification and assurance of the origin of information.
Authenticity
refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes
Integrity
the concealment of information or resources
Confidentiality
refers to the ability to use the information or resource desired
Availability
person who enjoys learning the details of computer systems and stretch their capabilities.
hacker
describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient
hacking
refers to a person who uses his hacking skills for offensive purposes.
cracker
refers to security professionals who apply their hacking skills for defensive purposes
ethical hacker
- An action or event that might prejudice security
- potential violation of security
Threat
Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.
Vulnerability
An IT system, product, or component that is identified/subjected as requiring security evaluation.
Target of Evaluation
- An assault on system security that derives from an intelligent threat.
- any action that violates security.
Attack
A defined way to breach the security of an IT system through vulnerability.
Exploit
can be defined as a legal and authorized attempt to locate and successfully exploit computer systems for the purpose of making those systems more secure.
Penetration testing
- The process includes probing for vulnerabilities as well as providing proof of concept attacks to demonstrate the vulnerabilities are real.
- testing always ends with specific recommendations for addressing and fixing the issues that were discovered during the test.
- find security issues by using the same tools and techniques as an attacker. These findings can then be mitigated before a real hacker exploits them.
Penetration Testing
Penetration testing is also known as
- pen testing
- pt
- ethical hacking’
- hacking
- white hat hacking
- offensive security
- red teaming
The first and simplest way to differentiate between white hats and black hats is
authorization
The second way to differentiate between an ethical hacker and a malicious hacker is through examination of the attacker’s
motivation
to provide the organization a realistic attack simulation so that the company can improve its security through early discovery and mitigation of vulnerabilities, the attacker should be considered a white hat.
intent
Differentiate Ethical from Malicious Hacker?
- authorization
- motivation
- intent
What Does a Malicious Hacker Do
1.recoinnaissance
2.scanning
3. gaining access
4. maintaining access
5. covering tracks
refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization
Reconnaissance
refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
scanning
- refers to the true attack phase.
- The hacker exploits the system.
gaining access
- refers to the phase when the hacker tries to retain his ‘ownership’ of the system.
- The hacker has exploited a vulnerability and can tamper and compromise the system.
maintaining access