CHAPTER 10 Flashcards
(13 cards)
…………Employed by companies to perform penetration tests
Ethical hackers
………………Legal attempt to break into a company’s network to find
its weakest link
▪ Tester only reports findings, does not solve problems
Penetration test
…………..More than an attempt to break in; also includes analyzing company’s security policy and procedures
Security test
……………………….. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
hacker
Why do hackers hack?
- Just for fun!
- Show off
- Steal important information
- Destroy other computers (such as enemy’s computers)
- Disrupt Services
- Money
T/F Independent computer security professionals breaking
into the computer system
* Neither damage the target systems nor steal
information
* Evaluate target systems security and report back to
owners about the bug found
T
Ethical Hackers but not Criminal Hackers
- Completely trustworthy
- Strong programming and computer networking skills
- Learn about the system and trying to find its weakness
Types of Hackers
Based on their motives and aims, hackers can be
categorized into three types:
- White Hat Hackers
- Black Hat Hackers
- Gray Hat Hackers
…………….are cyber security experts who breach
in an ‘official way.
White hat hackers
………………..are indeed technology geniuses, but
they have the wrong motive. They target other devices to
gain access to systems to which they are not allowed
Black hat Hackers
…………………as the name implies, is in between a white
hat and a black hat hacker
gray hat hacker
Why do we need Ethical hacking?
To save personal and confidential material from intruders, ethical hacking subsists.
Ethical hacking helps keep business and government
organizations out of trouble caused by hackers trying to
steal important data
It gives a great benefit if precautionary methods are taken
in advance by all the firms.
What should do after hack?
- Shutdown or turn off the system
- Separate the system from network
- Restore the system with the backup or reinstall all
programs - Connect the system to the network
- It can be good to call the police