Week 1 - Overview Flashcards
Motive
For the thrill of it or for criminal purposes.
Revenge, disgruntled current or former employees .
Financial gain through theft of financial information.
Corporate proprietary information, which can be sold.
Acts of terrorism, stating political statements against governments, etc.
Ethical Hacking
Professionals who work to identify loopholes and vulnerabilities on systems, report it to the vendor or owner of the system, and also, at times, help them fix it.
Penetration Testing
A more professional term used to describe what an ethical hacker does.
It’s a legal attempt to break into a company’s network to find its weakest link
The tester only reports findings, does not solve problems.
Vulnerability Assessment
At times organizations might want to only identify the vulnerabilities that exist in their systems without actually exploiting it and gaining access.
The end result is a report prioritizing the vulnerabilities found, with the most severe ones on the top and the ones posing lesser risk lower in the report.
Security Audits
A systematic procedure that is used to measure the state of a system/network and company’s security policies and procedures against a predetermined set of standards.
Hackers
Access computer system or network without authorization.
Breaks the law; can go to prison.
Black Hat, White Hat, and Gray Hat.
Suicide, State Sponsored.
Crackers
Break into systems to steal or destroy data.
U.S. Department of Justice calls both hackers.
Ethical Hacker
Performs most of the same activities with owner’s permission
Script Kiddies
Younger, inexperienced hackers who copy codes from knowledgeable hackers.
Packet Monkey
Blocking sites through DDOS attacks.
Cyber Terrorists
Attackers who have ideological motivation.
Hacktivists
Another group motivated by ideology.
State-Sponsored Attackers
Attackers supported by governments for launching computer.
Languages used
Perl, C, C++, Python, JavaScript, Visual Basic, SQL, etc.
Tiger box
Collection of OS’s and hacking tools.
Usually on a laptop.
Helps penetration testers and security testers conduct vulnerabilities assessments and attacks.