Introduction to Ethical Hacking (Glossary) Flashcards
occurs when a system is compromised based on a vulnerability by an unknown exploit
Attack
authorized personnel accessing the data at appointed times. Involves a comprehensive planning of hardware, software, facility, people, and connectivity.
Availability
malicious hackers that try to hack systems with malicious intent
Black hat
a model promoted to define and practice policies related to information security; uses confidentiality, integrity, and availability
CIA Triad
keeping access to the information only to the intended audience; does two things: ensures that the right people get the intended information and prevents sensitive information from reaching the wrong people
Confidentiality
the use of layered security mechanisms; the layers could be data, applications, host levels, Internet networks, perimeter levels, physical securities, etc.
Defense-in-depth
testing the resources for a good cause and for the betterment of technology; another term for “penetration testing.”
Ethical Hacking
written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
Exploit
focused on the server’s infrastructure and underlying software pertaining to the target; can be performed with no prior knowledge of the site or with full disclosure of the topology and environment
External Testing
hackers that can aid companies in informing them about any vulnerabilities they have found, but are not hired by the companies to perform such tests
Gray hat
the skill of exploring various security breaches and posting unwanted content on websites, stealing data, etc.; concentrates on exploits and vulnerabilities
Hacking
insiders who have authorization to access systems, and hackers who use exploits to attack
Human threats
maintaining the sanctity of information and keeping the data accurate throughout its life, whether it is on the same computer or shared over a network
Integrity
any type of program that is created with the intent to cause damage, steal data, or abuse computer system resources; includes computer viruses, worms, and Trojan horses
Malware
can be a flood causing areas to be waterlogged, or a hurricane or a tornado causing a lot of damage.; often impact the availability of systems
Natural threats