Explore tens of thousands of sets crafted by our community.
Ethical Hacking Basics
25
Flashcards
0/25
Footprinting
The process of collecting as much information as possible about a target system to find ways to infiltrate it. It's used in ethical hacking to plan an attack and find vulnerabilities.
Phishing
A technique of tricking a victim into giving away sensitive information by masquerading as a legitimate entity. Ethical hackers use this to test employee awareness and company defenses.
Port Scanning
The act of systematically scanning a computer's ports to find open ports and identify unknown services running on them. In ethical hacking, it helps in mapping a system's exposure to the internet.
SQL Injection
A code injection technique to attack data-driven applications, inserting malicious SQL statements into an entry field. Ethical hackers use it to test SQL database protections.
Encryption
Converting information from a readable state to a secure state to prevent unauthorized access. Ethical hackers analyze encryption methods to find weaknesses.
Social Engineering
Manipulating individuals to obtain confidential information. It's used by ethical hackers to simulate attacks to enhance an organization's security training.
Denial of Service (DoS)
An attack that renders a system unstable or unusable by overwhelming it with traffic. Ethical hackers perform controlled DoS tests to evaluate a system's resilience.
Cross Site Scripting (XSS)
A vulnerability that lets attackers inject client-side scripts into web pages viewed by others. Ethical hackers look for XSS vulnerabilities to prevent data breaches.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined rules. It's assessed by ethical hackers to ensure its effectiveness.
VPN Tunneling
Creating a secure network connection over public networks. Ethical hackers may test VPN strength and the ability to intercept data.
Password Cracking
The process of recovering passwords from data stored or transmitted by a computer system. Ethical hackers do this to help improve password policies.
Session Hijacking
The exploitation of a valid computer session to gain unauthorized access to information or services. Ethical hackers simulate it to test session management.
Keylogger
Software that records keystrokes made by a user to capture sensitive data. Ethical hackers use it to demonstrate risks and enforce better security policies.
Man-in-the-Middle (MitM) Attack
An attack where the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly. Ethical hackers identify mitigation techniques.
Rootkit
A type of malware that provides privileged access to a computer while concealing its presence. Ethical hackers scan for rootkits to prevent system takeovers.
Wardriving
The act of searching for Wi-Fi wireless networks from a moving vehicle. Ethical hackers conduct wardriving to assess network security and signal leakage.
Penetration Testing
A simulated cyber attack against a computer or network to check for exploitable vulnerabilities. Ethical hackers perform these to improve security postures.
Wireless Security
Protecting a wireless network from unauthorized and harmful access. Ethical hackers test wireless security controls and encryption protocols.
Honeypot
A security mechanism set to detect, deflect, or study hack attempts. Ethical hackers use honeypots to bait attackers and study their techniques.
Patch Management
The process of managing network patches to correct vulnerabilities and keep systems up to date. Ethical hackers help in identifying which patches are vital for security.
Security Policy
A defined set of rules and practices that govern how a company manages and protects its information. Ethical hackers review these policies to strengthen security frameworks.
Risk Assessment
The process of identifying and evaluating risks to an organization's operations. Ethical hackers contribute to pinpointing and prioritizing potential risks.
Intrusion Detection System (IDS)
A device or software application that monitors network or system activities for malicious activities. Ethical hackers test the effectiveness of IDS.
Chain of Custody
The chronological documentation that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. In ethical hacking, maintaining it is critical for legal admissibility.
Multi-Factor Authentication (MFA)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity. Ethical hackers often test the robustness of MFA implementations.
© Hypatia.Tech. 2024 All rights reserved.