1/13
These flashcards cover key concepts and terminology related to ethical hacking and information gathering processes as presented in the lecture.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Ethical Hacking
The practice of deliberately probing computer systems for vulnerabilities with the intent to improve their security.
Penetration Testing
A simulated cyber attack on a system to check for exploitable vulnerabilities.
Information Gathering
The initial phase of hacking where data about the target is collected to identify vulnerabilities.
Confidentiality
The principle that sensitive information should be accessed only by authorized individuals.
Integrity
The assurance that data is accurate and unaltered.
Availability
The principle that information and resources are available to authorized users when needed.
Black Hat Hacker
A hacker who violates computer security for personal gain or malicious intent.
White Hat Hacker
An ethical hacker who uses their skills to improve security and prevent cyber attacks.
Social Engineering
Manipulating people into divulging confidential information by exploiting psychological factors.
Google Hacking
Using advanced Google search queries to find sensitive information that may be exposed on websites.
OSINT
Open Source Intelligence, information collected from publicly available sources.
Vulnerabilities
Weaknesses in a system that can be exploited by attackers to gain unauthorized access.
Denial of Service (DoS)
An attack meant to make a service unavailable to its intended users.
Kali Linux
A Debian-based Linux distribution designed for digital forensics and penetration testing.