INTRODUCTION TO ETHICAL HACKING

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
INTRODUCTION TO ETHICAL HACKING Door Mind Map: INTRODUCTION TO ETHICAL HACKING

1. DEFINE = Hacking performed by a company or individual to help identify potential threats on a computer or network.

2. Type of Hacker

2.1. Script Kiddies

2.2. White-Hat Hackers

2.3. Grey-Hat Hackers

2.4. Black-Hat Hackers

2.5. Suicide Hackers

3. Testing Types

3.1. a. White box

3.2. b. Black box

3.3. c. Grey box

4. TERMINOLOGIES

4.1. a.Threat

4.2. b.Exploit

4.3. c.Vulnerability

4.4. d.Target of Evaluation (toe)

4.5. e.Attack

4.6. f.Remote

5. System Hacking Cycle

5.1. 1.0 Reconnaissance

5.2. 2.0 Sacnning

5.3. 3.0 Gaining Access

5.4. 4.0 Maintaining Access

5.5. 5.0 Covering Track

6. Skill required

6.1. - InfoSec - Routers - Communication & report writing - knowledge of threat sources - Project manager - Problem management - Network protocol - Firewall