
Explore tens of thousands of sets crafted by our community.
Ethical Hacking Basics
25
Flashcards
0/25
Footprinting
The process of collecting as much information as possible about a target system to find ways to infiltrate it. It's used in ethical hacking to plan an attack and find vulnerabilities.
Wireless Security
Protecting a wireless network from unauthorized and harmful access. Ethical hackers test wireless security controls and encryption protocols.
Honeypot
A security mechanism set to detect, deflect, or study hack attempts. Ethical hackers use honeypots to bait attackers and study their techniques.
Cross Site Scripting (XSS)
A vulnerability that lets attackers inject client-side scripts into web pages viewed by others. Ethical hackers look for XSS vulnerabilities to prevent data breaches.
Security Policy
A defined set of rules and practices that govern how a company manages and protects its information. Ethical hackers review these policies to strengthen security frameworks.
Encryption
Converting information from a readable state to a secure state to prevent unauthorized access. Ethical hackers analyze encryption methods to find weaknesses.
Social Engineering
Manipulating individuals to obtain confidential information. It's used by ethical hackers to simulate attacks to enhance an organization's security training.
Multi-Factor Authentication (MFA)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity. Ethical hackers often test the robustness of MFA implementations.
Phishing
A technique of tricking a victim into giving away sensitive information by masquerading as a legitimate entity. Ethical hackers use this to test employee awareness and company defenses.
Denial of Service (DoS)
An attack that renders a system unstable or unusable by overwhelming it with traffic. Ethical hackers perform controlled DoS tests to evaluate a system's resilience.
VPN Tunneling
Creating a secure network connection over public networks. Ethical hackers may test VPN strength and the ability to intercept data.
Wardriving
The act of searching for Wi-Fi wireless networks from a moving vehicle. Ethical hackers conduct wardriving to assess network security and signal leakage.
Penetration Testing
A simulated cyber attack against a computer or network to check for exploitable vulnerabilities. Ethical hackers perform these to improve security postures.
Risk Assessment
The process of identifying and evaluating risks to an organization's operations. Ethical hackers contribute to pinpointing and prioritizing potential risks.
Patch Management
The process of managing network patches to correct vulnerabilities and keep systems up to date. Ethical hackers help in identifying which patches are vital for security.
Man-in-the-Middle (MitM) Attack
An attack where the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly. Ethical hackers identify mitigation techniques.
Port Scanning
The act of systematically scanning a computer's ports to find open ports and identify unknown services running on them. In ethical hacking, it helps in mapping a system's exposure to the internet.
Intrusion Detection System (IDS)
A device or software application that monitors network or system activities for malicious activities. Ethical hackers test the effectiveness of IDS.
SQL Injection
A code injection technique to attack data-driven applications, inserting malicious SQL statements into an entry field. Ethical hackers use it to test SQL database protections.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined rules. It's assessed by ethical hackers to ensure its effectiveness.
Keylogger
Software that records keystrokes made by a user to capture sensitive data. Ethical hackers use it to demonstrate risks and enforce better security policies.
Chain of Custody
The chronological documentation that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. In ethical hacking, maintaining it is critical for legal admissibility.
Password Cracking
The process of recovering passwords from data stored or transmitted by a computer system. Ethical hackers do this to help improve password policies.
Session Hijacking
The exploitation of a valid computer session to gain unauthorized access to information or services. Ethical hackers simulate it to test session management.
Rootkit
A type of malware that provides privileged access to a computer while concealing its presence. Ethical hackers scan for rootkits to prevent system takeovers.
© Hypatia.Tech. 2024 All rights reserved.