● Hacker (n) – refers to a person who enjoys learning the details of computer systems and stretch their capabilities.
● Hacking (v) – describes the rapid development of new programs or reverse engineering of already existing software to make the code better and efficient.
● Cracker – refers to a person who uses his hacking skills for offensive purposes.
● Phreak – a hacker variant with an interest in telephones and telephone systems.
● Hactivism – refers to an act of hacking in order to communicate a politically or socially motivated message. An Internet enabled way to practice civil disobedience and protest.
Ethical Hacker – refers to security professional who apply their hacking skills for defensive purposes on behalf of its owners.
Ethical Hacking – is also known as penetration testing, intrusion testing, red teaming.
Anatomy of a hack (Reconnaissance)-Refers to a preparatory phase where an attacker seeks to gather as much information as possible about the target of evaluation prior to launching an attack.
methodological manner.
Scanning – refers to a pre-attack phase when the hacker scans the network with a specific information gathered during footprinting.
Gaining Access- Gaining access refers to the true attack phase.
Maintaining Access-refers to the phase when the attacker tries to retain his ownership' of the system.
Covering Tracks- Covering tracks refers to remove the evidence of his presence and activities.
System Hacking-Remote Systems access
Denial of Service- An attack with which an attacker renders a system unusable or significantly slowdown the system
Friday, March 19, 2010
Subscribe to:
Post Comments (Atom)
Labels
- #leadership (1)
- Career Opportunities (63)
- Financial Planning (16)
- General Information (75)
- Health (7)
- IT Jobs/Courses (21)
- Recruitment (1)
- Technical writer (1)
- WalkIn Interviews (12)
No comments:
Post a Comment