Ethical Hacker

Get Started. It's Free
or sign up with your email address
Ethical Hacker by Mind Map: Ethical Hacker

1. TERMINOLOGIES

1.1. 1. Threat 2. Exploit 3. Vulnerabilities ~target for the weak spot 4. Target of evaluation (TOE) 5. ATTACK!! 6. Remote

2. SYSTEM HACKING CYCLE

2.1. Recoinnsaince ~to locate enemy

2.2. scanning

2.3. gaining access

2.4. maintaining access

2.5. clearing tracks

3. HACKERS VS CRACKERS

3.1. hackers build things, crackers break things.

3.2. TYPES OF HACKERS

3.2.1. Script kiddies

3.2.2. White-hat hackers

3.2.3. Gray-hat hackers

3.2.4. Black-hat hackers

3.2.5. Suicide hackers

4. WAYS TO CONDUCT ETHICAL HACKING

4.1. Step 1. Formulating Your Plan

4.2. Step 2: Do Some Recon

4.3. Step 3: Launch the Attack

4.4. Step 4: Evaluate the Results

5. DEFINISI

5.1. Etichal hacker ni dia baik atau nama lain dia adalah white hat (ultimate security profesional)

6. JOB ROLE

6.1. 1. break into system legally 2. examine it. so it cannot be exploited

7. TESTING TYPES

7.1. White box

7.1.1. Full knowledge test :

7.2. Black box

7.2.1. Knowledge test

7.3. Gray box

7.3.1. Zero knowledge test