CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY
mila osminにより
1. ethical hacking terminologies
1.1. a. Threat
1.2. b. Exploit
1.3. c. Vulnerability
1.4. d. Target of Evaluation (toe)
1.5. e. Attack
1.6. f. Remote
2. system hacking cycle
3. system hacking
4. types of hacker
5. ways to conduct ethical hacking
6. steps to perform security audit in an organization
7. Define ethical hacking
8. ethical hacker
9. crackers VS hackers
10. testing types:
10.1. a. White box
10.2. b. Black box
10.3. c. Gray box
11. legal implications of hacking
12. rules in ethical hacking