0% found this document useful (0 votes)
113 views17 pages

Concept of Hacking: Breaking Into Information Without Permission Unauthorized Access To Computer

Ethical hacking involves legally hacking into a company's network at their request to test security vulnerabilities from the perspective of a hacker, with the goal of improving security rather than causing harm; it is an important practice for organizations to protect themselves against growing security threats, and ethical hackers may receive certifications or work for penetration testing companies following standards and laws for ethical conduct.

Uploaded by

nermeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views17 pages

Concept of Hacking: Breaking Into Information Without Permission Unauthorized Access To Computer

Ethical hacking involves legally hacking into a company's network at their request to test security vulnerabilities from the perspective of a hacker, with the goal of improving security rather than causing harm; it is an important practice for organizations to protect themselves against growing security threats, and ethical hackers may receive certifications or work for penetration testing companies following standards and laws for ethical conduct.

Uploaded by

nermeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Concept of hacking

Breaking into information without permission


Unauthorized access to computer
Introduction to Ethical Hacking
 Ethical hackers
 Employed by companies to perform penetration tests
 Also referred as white hat
 Penetration test
 Legal attempt to break into a company’s network to find its
weakest link
 Tester only reports findings, does not solve problems
 Security test
 More than an attempt to break in; also includes analyzing
company’s security policy and procedures
 Tester offers solutions to secure or protect the network
Hands-On Ethical Hacking and Network Defense 3
Importance of ethical hacking
• Government agencies and business organizations today are in
constant need of ethical hackers to combat the growing threat to IT
security. A lot of government agencies, professionals and corporations
now understand that if you want to protect a system, you cannot do it
by just locking your doors
says Jay Bavisi, CEO of EC-Council.
Types of Ethical Hacking
Penetration-Testing
Penetration-Testing Methodologies

• White box model


• Tester is told everything about the network topology and
technology
• Tester is authorized to interview IT personnel and company
employees
• Makes tester’s job a little easier

Hands-On Ethical Hacking and Network Defense 8


Penetration-Testing Methodologies

 Black box model


 Company staff does not know about the test
 Tester is not given details about the network
 Tests if security personnel are able to detect an attack

Hands-On Ethical Hacking and Network Defense 9


Penetration-Testing Methodologies

• Gray box model


• Hybrid of the white and black box models
• Company gives tester partial information

Hands-On Ethical Hacking and Network Defense 10


Penetration-Testing Methodologies

• Tiger box
• Collection of OSs and hacking tools
• Usually on a laptop
• Helps penetration testers and security testers conduct
vulnerabilities assessments and attacks

Hands-On Ethical Hacking and Network Defense 11


How hacking can be ethical
• Code of ethics by EC-council
• Privacy
• Legal limits
• Extreme care
Certified Ethical Hacker (CEH)

13
Certified Information Systems Security
Professional (CISSP)
• Issued by the International
Information Systems Security
Certifications Consortium (ISC2)
• Usually more concerned with policies
and procedures than technical details

14
Federal Laws
• Federal computer crime laws are getting more specific
• Cover cybercrimes and intellectual property issues
• Computer Hacking and Intellectual Property (CHIP)
• New government branch to address cybercrimes and
intellectual property issues

Hands-On Ethical Hacking and Network Defense 15


Hands-On Ethical Hacking and Network Defense 16
Islam and ethical hacking

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy