Concept of Hacking: Breaking Into Information Without Permission Unauthorized Access To Computer

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Concept of hacking

Breaking into information without permission


Unauthorized access to computer
Introduction to Ethical Hacking
 Ethical hackers
 Employed by companies to perform penetration tests
 Also referred as white hat
 Penetration test
 Legal attempt to break into a company’s network to find its
weakest link
 Tester only reports findings, does not solve problems
 Security test
 More than an attempt to break in; also includes analyzing
company’s security policy and procedures
 Tester offers solutions to secure or protect the network
Hands-On Ethical Hacking and Network Defense 3
Importance of ethical hacking
• Government agencies and business organizations today are in
constant need of ethical hackers to combat the growing threat to IT
security. A lot of government agencies, professionals and corporations
now understand that if you want to protect a system, you cannot do it
by just locking your doors
says Jay Bavisi, CEO of EC-Council.
Types of Ethical Hacking
Penetration-Testing
Penetration-Testing Methodologies

• White box model


• Tester is told everything about the network topology and
technology
• Tester is authorized to interview IT personnel and company
employees
• Makes tester’s job a little easier

Hands-On Ethical Hacking and Network Defense 8


Penetration-Testing Methodologies

 Black box model


 Company staff does not know about the test
 Tester is not given details about the network
 Tests if security personnel are able to detect an attack

Hands-On Ethical Hacking and Network Defense 9


Penetration-Testing Methodologies

• Gray box model


• Hybrid of the white and black box models
• Company gives tester partial information

Hands-On Ethical Hacking and Network Defense 10


Penetration-Testing Methodologies

• Tiger box
• Collection of OSs and hacking tools
• Usually on a laptop
• Helps penetration testers and security testers conduct
vulnerabilities assessments and attacks

Hands-On Ethical Hacking and Network Defense 11


How hacking can be ethical
• Code of ethics by EC-council
• Privacy
• Legal limits
• Extreme care
Certified Ethical Hacker (CEH)

13
Certified Information Systems Security
Professional (CISSP)
• Issued by the International
Information Systems Security
Certifications Consortium (ISC2)
• Usually more concerned with policies
and procedures than technical details

14
Federal Laws
• Federal computer crime laws are getting more specific
• Cover cybercrimes and intellectual property issues
• Computer Hacking and Intellectual Property (CHIP)
• New government branch to address cybercrimes and
intellectual property issues

Hands-On Ethical Hacking and Network Defense 15


Hands-On Ethical Hacking and Network Defense 16
Islam and ethical hacking

You might also like