CHAPTER 1 - Introduction To Ethical Hacking
CHAPTER 1 - Introduction To Ethical Hacking
Hacking
CHAPTER 1
https://www.hackerschool.in
Ethical Hacking
https://www.hackerschool.in
Hacking
https://www.hackerschool.in
Hacker
https://www.hackerschool.in
Types of Hackers
https://www.hackerschool.in
Phases of hacking
Foot printing
Scanning
Gaining access
Maintain access
Covering tracks
https://www.hackerschool.in
Terminologies
https://www.hackerschool.in
Terminologies (Cont'd)
Threat actor: is a person responsible for an event or incident that impacts or has the
potential to impact.
Zero day: an exploit attack for which there is no defense by antivirus, intrusion
prevention system (IPS) and firewalls.
Risk: Risk is defined as the potential for loss or damage when a threat exploits a
vulnerability. Examples of risk include financial loss, damage to reputation, loss of
privacy, legal implications etc.
https://www.hackerschool.in
Cyber security
https://www.hackerschool.in
Information Security
Information security, often referred to as InfoSec, refers to the processes and tools
designed and deployed to protect sensitive business information from modification,
disruption, destruction, and inspection.
https://www.hackerschool.in
Elements of Information Security
NAME EXAMPLE
https://www.hackerschool.in