Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Ethical Hacking Basics

25

Flashcards

0/25

Still learning
StarStarStarStar

Penetration Testing

StarStarStarStar

A simulated cyber attack against a computer or network to check for exploitable vulnerabilities. Ethical hackers perform these to improve security postures.

StarStarStarStar

Patch Management

StarStarStarStar

The process of managing network patches to correct vulnerabilities and keep systems up to date. Ethical hackers help in identifying which patches are vital for security.

StarStarStarStar

Denial of Service (DoS)

StarStarStarStar

An attack that renders a system unstable or unusable by overwhelming it with traffic. Ethical hackers perform controlled DoS tests to evaluate a system's resilience.

StarStarStarStar

Multi-Factor Authentication (MFA)

StarStarStarStar

A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity. Ethical hackers often test the robustness of MFA implementations.

StarStarStarStar

Phishing

StarStarStarStar

A technique of tricking a victim into giving away sensitive information by masquerading as a legitimate entity. Ethical hackers use this to test employee awareness and company defenses.

StarStarStarStar

SQL Injection

StarStarStarStar

A code injection technique to attack data-driven applications, inserting malicious SQL statements into an entry field. Ethical hackers use it to test SQL database protections.

StarStarStarStar

Honeypot

StarStarStarStar

A security mechanism set to detect, deflect, or study hack attempts. Ethical hackers use honeypots to bait attackers and study their techniques.

StarStarStarStar

Man-in-the-Middle (MitM) Attack

StarStarStarStar

An attack where the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly. Ethical hackers identify mitigation techniques.

StarStarStarStar

Wardriving

StarStarStarStar

The act of searching for Wi-Fi wireless networks from a moving vehicle. Ethical hackers conduct wardriving to assess network security and signal leakage.

StarStarStarStar

Security Policy

StarStarStarStar

A defined set of rules and practices that govern how a company manages and protects its information. Ethical hackers review these policies to strengthen security frameworks.

StarStarStarStar

Password Cracking

StarStarStarStar

The process of recovering passwords from data stored or transmitted by a computer system. Ethical hackers do this to help improve password policies.

StarStarStarStar

Risk Assessment

StarStarStarStar

The process of identifying and evaluating risks to an organization's operations. Ethical hackers contribute to pinpointing and prioritizing potential risks.

StarStarStarStar

Social Engineering

StarStarStarStar

Manipulating individuals to obtain confidential information. It's used by ethical hackers to simulate attacks to enhance an organization's security training.

StarStarStarStar

Session Hijacking

StarStarStarStar

The exploitation of a valid computer session to gain unauthorized access to information or services. Ethical hackers simulate it to test session management.

StarStarStarStar

Encryption

StarStarStarStar

Converting information from a readable state to a secure state to prevent unauthorized access. Ethical hackers analyze encryption methods to find weaknesses.

StarStarStarStar

VPN Tunneling

StarStarStarStar

Creating a secure network connection over public networks. Ethical hackers may test VPN strength and the ability to intercept data.

StarStarStarStar

Keylogger

StarStarStarStar

Software that records keystrokes made by a user to capture sensitive data. Ethical hackers use it to demonstrate risks and enforce better security policies.

StarStarStarStar

Rootkit

StarStarStarStar

A type of malware that provides privileged access to a computer while concealing its presence. Ethical hackers scan for rootkits to prevent system takeovers.

StarStarStarStar

Footprinting

StarStarStarStar

The process of collecting as much information as possible about a target system to find ways to infiltrate it. It's used in ethical hacking to plan an attack and find vulnerabilities.

StarStarStarStar

Wireless Security

StarStarStarStar

Protecting a wireless network from unauthorized and harmful access. Ethical hackers test wireless security controls and encryption protocols.

StarStarStarStar

Chain of Custody

StarStarStarStar

The chronological documentation that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. In ethical hacking, maintaining it is critical for legal admissibility.

StarStarStarStar

Port Scanning

StarStarStarStar

The act of systematically scanning a computer's ports to find open ports and identify unknown services running on them. In ethical hacking, it helps in mapping a system's exposure to the internet.

StarStarStarStar

Firewall

StarStarStarStar

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined rules. It's assessed by ethical hackers to ensure its effectiveness.

StarStarStarStar

Cross Site Scripting (XSS)

StarStarStarStar

A vulnerability that lets attackers inject client-side scripts into web pages viewed by others. Ethical hackers look for XSS vulnerabilities to prevent data breaches.

StarStarStarStar

Intrusion Detection System (IDS)

StarStarStarStar

A device or software application that monitors network or system activities for malicious activities. Ethical hackers test the effectiveness of IDS.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.