Explore tens of thousands of sets crafted by our community.
Ethical Hacking Basics
25
Flashcards
0/25
Penetration Testing
A simulated cyber attack against a computer or network to check for exploitable vulnerabilities. Ethical hackers perform these to improve security postures.
Patch Management
The process of managing network patches to correct vulnerabilities and keep systems up to date. Ethical hackers help in identifying which patches are vital for security.
Denial of Service (DoS)
An attack that renders a system unstable or unusable by overwhelming it with traffic. Ethical hackers perform controlled DoS tests to evaluate a system's resilience.
Multi-Factor Authentication (MFA)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity. Ethical hackers often test the robustness of MFA implementations.
Phishing
A technique of tricking a victim into giving away sensitive information by masquerading as a legitimate entity. Ethical hackers use this to test employee awareness and company defenses.
SQL Injection
A code injection technique to attack data-driven applications, inserting malicious SQL statements into an entry field. Ethical hackers use it to test SQL database protections.
Honeypot
A security mechanism set to detect, deflect, or study hack attempts. Ethical hackers use honeypots to bait attackers and study their techniques.
Man-in-the-Middle (MitM) Attack
An attack where the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly. Ethical hackers identify mitigation techniques.
Wardriving
The act of searching for Wi-Fi wireless networks from a moving vehicle. Ethical hackers conduct wardriving to assess network security and signal leakage.
Security Policy
A defined set of rules and practices that govern how a company manages and protects its information. Ethical hackers review these policies to strengthen security frameworks.
Password Cracking
The process of recovering passwords from data stored or transmitted by a computer system. Ethical hackers do this to help improve password policies.
Risk Assessment
The process of identifying and evaluating risks to an organization's operations. Ethical hackers contribute to pinpointing and prioritizing potential risks.
Social Engineering
Manipulating individuals to obtain confidential information. It's used by ethical hackers to simulate attacks to enhance an organization's security training.
Session Hijacking
The exploitation of a valid computer session to gain unauthorized access to information or services. Ethical hackers simulate it to test session management.
Encryption
Converting information from a readable state to a secure state to prevent unauthorized access. Ethical hackers analyze encryption methods to find weaknesses.
VPN Tunneling
Creating a secure network connection over public networks. Ethical hackers may test VPN strength and the ability to intercept data.
Keylogger
Software that records keystrokes made by a user to capture sensitive data. Ethical hackers use it to demonstrate risks and enforce better security policies.
Rootkit
A type of malware that provides privileged access to a computer while concealing its presence. Ethical hackers scan for rootkits to prevent system takeovers.
Footprinting
The process of collecting as much information as possible about a target system to find ways to infiltrate it. It's used in ethical hacking to plan an attack and find vulnerabilities.
Wireless Security
Protecting a wireless network from unauthorized and harmful access. Ethical hackers test wireless security controls and encryption protocols.
Chain of Custody
The chronological documentation that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. In ethical hacking, maintaining it is critical for legal admissibility.
Port Scanning
The act of systematically scanning a computer's ports to find open ports and identify unknown services running on them. In ethical hacking, it helps in mapping a system's exposure to the internet.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined rules. It's assessed by ethical hackers to ensure its effectiveness.
Cross Site Scripting (XSS)
A vulnerability that lets attackers inject client-side scripts into web pages viewed by others. Ethical hackers look for XSS vulnerabilities to prevent data breaches.
Intrusion Detection System (IDS)
A device or software application that monitors network or system activities for malicious activities. Ethical hackers test the effectiveness of IDS.
© Hypatia.Tech. 2024 All rights reserved.