際際滷

際際滷Share a Scribd company logo
An ethical hacker is a computer and                    increasingly         common       outside           the
network expert who attacks a security                  government and technology sectors where
system on behalf of its owners, seeking                it began. Many large companies, such as
vulnerabilities that a malicious hacker                IBM, maintain employee teams of ethical
could exploit.                                         hackers.

To test a security system, ethical hackers             Attack Types and Vulnerabilities:
use the same methods as their less
                                                                There exist numerous ways to
principled     counterparts,         but     report
                                                       attack a target system. It could be
problems instead of taking advantage of
                                                       achieved        by      exploiting               known
them.
                                                       vulnerabilities in software or taking
Ethical     hacking      is   also     known     as    advantage of a badly configured security
penetration testing, intrusion testing and             policy; it could be implemented remotely
red teaming.                                           or     internally.    The     techniques            and
                                                       methods      used      are    likely        to     vary
An ethical hacker is sometimes called a
                                                       depending on the target and they should
white hat, a term that comes from old
                                                       be chosen appropriately having assessed
Western movies, where the "good guy"
                                                       the situation fully. The attack types and
wore a white hat and the "bad guy" wore
                                                       vulnerabilities discussed in this module
a black hat.
                                                       are:
        One of the first examples of ethical
hackers at work was in the 1970s, when                          Buffer Overflow attacks.

the   United        States    government       used             Denial of Service (DoS) attacks.

groups of experts called red teams to hack                      Distributed     Denial        of        Service

its own computer systems.                                       (DDoS) attacks.
                                                                Misconfigurations.
          According to Ed Skoudis, Vice
                                                                Abuse of Trust.
President      of     Security    Strategy      for
                                                                Brute force attacks.
Predictive     Systems'       Global       Integrity
                                                                CGI and WWW services.
consulting practice, ethical hacking has
                                                                Back doors and Trojans.
continued to grow in an otherwise
lackluster IT industry, and is becoming
Types of Hacking:

     Website Hacking
     Email Hacking
     Network Hacking
     Password Hacking
     Online banking Hacking
     Computer Hacking

Advantages and disadvantages of
hacking:

  Advantages-

     -Can be used to recover lost
     information where the computer
     password has been lost.
     -Teaches u that no technology is
     100% secure
     -None really

  Disadvantages-

     -Criminals can use it to their
     advantage.
     -It can harm someone's privacy
     -Its illegal

More Related Content

Ethical hacking

  • 1. An ethical hacker is a computer and increasingly common outside the network expert who attacks a security government and technology sectors where system on behalf of its owners, seeking it began. Many large companies, such as vulnerabilities that a malicious hacker IBM, maintain employee teams of ethical could exploit. hackers. To test a security system, ethical hackers Attack Types and Vulnerabilities: use the same methods as their less There exist numerous ways to principled counterparts, but report attack a target system. It could be problems instead of taking advantage of achieved by exploiting known them. vulnerabilities in software or taking Ethical hacking is also known as advantage of a badly configured security penetration testing, intrusion testing and policy; it could be implemented remotely red teaming. or internally. The techniques and methods used are likely to vary An ethical hacker is sometimes called a depending on the target and they should white hat, a term that comes from old be chosen appropriately having assessed Western movies, where the "good guy" the situation fully. The attack types and wore a white hat and the "bad guy" wore vulnerabilities discussed in this module a black hat. are: One of the first examples of ethical hackers at work was in the 1970s, when Buffer Overflow attacks. the United States government used Denial of Service (DoS) attacks. groups of experts called red teams to hack Distributed Denial of Service its own computer systems. (DDoS) attacks. Misconfigurations. According to Ed Skoudis, Vice Abuse of Trust. President of Security Strategy for Brute force attacks. Predictive Systems' Global Integrity CGI and WWW services. consulting practice, ethical hacking has Back doors and Trojans. continued to grow in an otherwise lackluster IT industry, and is becoming
  • 2. Types of Hacking: Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking Advantages and disadvantages of hacking: Advantages- -Can be used to recover lost information where the computer password has been lost. -Teaches u that no technology is 100% secure -None really Disadvantages- -Criminals can use it to their advantage. -It can harm someone's privacy -Its illegal