Module Objective:
- Understanding the importance of security
- Introducing ethical hacking and essential terminology for the module
- Understanding the different phases involved in an exploit by a hacker
- Overview of attacks and identification of exploit categories
- Comprehending ethical hacking
- Legal implications of hacking
- Hacking, law and punishment
Why Security:
- Evolution of technology focused on ease of use Increasing complexity of computer infrastructure administration and management
- Decreasing skill level needed for exploits
- Direct impact of security breach on corporate asset base and goodwill
- Increased networked environment and network based applications
Can Hacking Be Ethical?
- The noun ‘hacker’ refers to a person who enjoys learning the details of computer systems and stretch their capabilities.
- The verb ‘hacking’ describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.
- The term ‘cracker’ refers to a person who uses his hacking skills for offensive purposes.
- The term ‘ethical hacker’ refers to security professionals who apply their hacking skills for defensive purposes.
Elements of Security:
- Security is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of
- information and services is kept low or tolerable
- Any hacking event will affect any one or more of the essential security elements.
- Security rests on confidentiality, authenticity, integrity, and availability
- Confidentiality is the concealment of information or resources.
- Authenticity is the identification and assurance of the origin of information.
- Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes.
- Availability refers to the ability to use the information or resource desired
What Does a Malicious Hacker Do?
- Reconnaissance
- Active / passive
- Scanning
- Gaining access
- Operating system level / application level
- Network level
- Denial of service
- Maintaining access
- Uploading / altering / downloading programs or data
- Covering tracks
Hacker Classes:
- Black hats
- Ethical Hacker Classes
- Former Black Hats
- White Hats
- White Hats
- Gray Hats
- Consulting Firms
Security Testing:
- There are many different forms of security testing.
- Examples include vulnerability scanning, ethical hacking and penetration testing.
- Security testing can be conducted using one of two approaches:
- Black-box (with no prior knowledge of the infrastructure to be tested)
- White-box (with a complete knowledge of the network infrastructure).
- Internal Testing is also known as Gray-box testing and this examines the extent of access by insiders within the network.
Final Comments:
- Security is critical across sectors and industries.
- Ethical Hacking is a methodology to simulate a malicious attack without causing damage.
- Hacking involves five distinct phases.
- Security evaluation includes preparation, conduct and evaluation phases.
- Cyber crime can be differentiated into two categories.
- U.S. Statutes ξ 1029 and 1030 primarily address cyber crime.
Feel Free to Contact us for any help.
No comments:
Post a Comment