Module Objective:
- Understanding the importance of security
 - Introducing ethical hacking and essential terminology for the module
 - Understanding the different phases involved in an exploit by a hacker
 - Overview of attacks and identification of exploit categories
 - Comprehending ethical hacking
 - Legal implications of hacking
 - Hacking, law and punishment
 
Why Security:
- Evolution of technology focused on ease of use Increasing complexity of computer infrastructure administration and management
 - Decreasing skill level needed for exploits
 - Direct impact of security breach on corporate asset base and goodwill
 - Increased networked environment and network based applications
 
Can Hacking Be Ethical?
- The noun ‘hacker’ refers to a person who enjoys learning the details of computer systems and stretch their capabilities.
 - The verb ‘hacking’ describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.
 - The term ‘cracker’ refers to a person who uses his hacking skills for offensive purposes.
 - The term ‘ethical hacker’ refers to security professionals who apply their hacking skills for defensive purposes.
 
Elements of Security:
- Security is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of
 - information and services is kept low or tolerable
 - Any hacking event will affect any one or more of the essential security elements.
 - Security rests on confidentiality, authenticity, integrity, and availability
 
- Confidentiality is the concealment of information or resources.
 - Authenticity is the identification and assurance of the origin of information.
 - Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes.
 - Availability refers to the ability to use the information or resource desired
 
What Does a Malicious Hacker Do?
- Reconnaissance
 - Active / passive
 - Scanning
 - Gaining access
 - Operating system level / application level
 - Network level
 - Denial of service
 - Maintaining access
 - Uploading / altering / downloading programs or data
 - Covering tracks
 
Hacker Classes:
- Black hats
 - Ethical Hacker Classes
 - Former Black Hats
 - White Hats
 - White Hats
 - Gray Hats
 - Consulting Firms
 
Security Testing:
- There are many different forms of security testing.
 - Examples include vulnerability scanning, ethical hacking and penetration testing.
 - Security testing can be conducted using one of two approaches:
 - Black-box (with no prior knowledge of the infrastructure to be tested)
 - White-box (with a complete knowledge of the network infrastructure).
 - Internal Testing is also known as Gray-box testing and this examines the extent of access by insiders within the network.
 
Final Comments:
- Security is critical across sectors and industries.
 - Ethical Hacking is a methodology to simulate a malicious attack without causing damage.
 - Hacking involves five distinct phases.
 - Security evaluation includes preparation, conduct and evaluation phases.
 - Cyber crime can be differentiated into two categories.
 - U.S. Statutes ξ 1029 and 1030 primarily address cyber crime.
 
Feel Free to Contact us for any help.


No comments:
Post a Comment