CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY

Get Started. It's Free
or sign up with your email address
CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY by Mind Map: CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY

1. Define ethical hacking

2. ethical hacker

3. ethical hacking terminologies

3.1. a. Threat

3.2. b. Exploit

3.3. c. Vulnerability

3.4. d. Target of Evaluation (toe)

3.5. e. Attack

3.6. f. Remote

4. system hacking cycle

5. system hacking

6. crackers VS hackers

7. types of hacker

8. testing types:

8.1. a. White box

8.2. b. Black box

8.3. c. Gray box

9. ways to conduct ethical hacking

10. legal implications of hacking

11. steps to perform security audit in an organization

12. rules in ethical hacking