module 1 Flashcards
What are the regulations in Ethical Hacking ?
- use information learned only for educational purposes.
- never use tools for malicious purposes or for fun.
- do not misuse the information for gaining unauthorized access.
- inform loophole
What are the basic terminology of hacking ?
- Vulnerability
- Threat
- Intrusion
- Breach
What is vulnerability?
Weakness in the network and/or its protocol.
What is threat?
Set of circumstances that has the potential to cause harm.
What is intrusion?
Any act or event that compromises the information on a network.
What is breach?
Breakdown of security of the network.
What is white hat hacker?
- ethical hacker
- non-malicious reasons
- clear code of ethics
- work together to improve security
What is black hat hacker?
- get information without authorization
- for crime purposes
What is grey hat hacker?
- ambiguous ethics borderline.
What are the 5 generic intrusion types?
- interruption
- interception
- modification
- fabrication
- invasion
What is interruption?
- making access to a resource become unavailable
DOS attack.
What is interception?
- Gaining unauthorized access to information
eavesdrops
sniffing: active/ passive
What is modification?
- change the information of a resource
Man-in-the-middle
What is fabrication?
- insertion of malicious objects into a system
malware
What is invasion?
- Taking control of a resource and stealing information
Session Hijacking