CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY Door Mind Map: CHAPTER 1 INTRODUCTION TO HACKING, ETHICS AND LEGALITY

1. ethical hacking terminologies

1.1. a. Threat

1.2. b. Exploit

1.3. c. Vulnerability

1.4. d. Target of Evaluation (toe)

1.5. e. Attack

1.6. f. Remote

2. system hacking cycle

3. system hacking

4. types of hacker

5. ways to conduct ethical hacking

6. steps to perform security audit in an organization

7. Define ethical hacking

8. ethical hacker

9. crackers VS hackers

10. testing types:

10.1. a. White box

10.2. b. Black box

10.3. c. Gray box

11. legal implications of hacking

12. rules in ethical hacking