Concept of Hacking: Breaking Into Information Without Permission Unauthorized Access To Computer
Concept of Hacking: Breaking Into Information Without Permission Unauthorized Access To Computer
Concept of Hacking: Breaking Into Information Without Permission Unauthorized Access To Computer
• Tiger box
• Collection of OSs and hacking tools
• Usually on a laptop
• Helps penetration testers and security testers conduct
vulnerabilities assessments and attacks
13
Certified Information Systems Security
Professional (CISSP)
• Issued by the International
Information Systems Security
Certifications Consortium (ISC2)
• Usually more concerned with policies
and procedures than technical details
14
Federal Laws
• Federal computer crime laws are getting more specific
• Cover cybercrimes and intellectual property issues
• Computer Hacking and Intellectual Property (CHIP)
• New government branch to address cybercrimes and
intellectual property issues