CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY
by mila osmin
1. Define ethical hacking
2. ethical hacker
3. ethical hacking terminologies
3.1. a. Threat
3.2. b. Exploit
3.3. c. Vulnerability
3.4. d. Target of Evaluation (toe)
3.5. e. Attack
3.6. f. Remote
4. system hacking cycle
5. system hacking
6. crackers VS hackers
7. types of hacker
8. testing types:
8.1. a. White box
8.2. b. Black box
8.3. c. Gray box
9. ways to conduct ethical hacking
10. legal implications of hacking
11. steps to perform security audit in an organization
12. rules in ethical hacking