IN5290 Ethical Hacking - Lecture 1: Introduction to Ethical Hacking, Information Gathering

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terminology related to ethical hacking and information gathering processes as presented in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Ethical Hacking

The practice of deliberately probing computer systems for vulnerabilities with the intent to improve their security.

2
New cards

Penetration Testing

A simulated cyber attack on a system to check for exploitable vulnerabilities.

3
New cards

Information Gathering

The initial phase of hacking where data about the target is collected to identify vulnerabilities.

4
New cards

Confidentiality

The principle that sensitive information should be accessed only by authorized individuals.

5
New cards

Integrity

The assurance that data is accurate and unaltered.

6
New cards

Availability

The principle that information and resources are available to authorized users when needed.

7
New cards

Black Hat Hacker

A hacker who violates computer security for personal gain or malicious intent.

8
New cards

White Hat Hacker

An ethical hacker who uses their skills to improve security and prevent cyber attacks.

9
New cards

Social Engineering

Manipulating people into divulging confidential information by exploiting psychological factors.

10
New cards

Google Hacking

Using advanced Google search queries to find sensitive information that may be exposed on websites.

11
New cards

OSINT

Open Source Intelligence, information collected from publicly available sources.

12
New cards

Vulnerabilities

Weaknesses in a system that can be exploited by attackers to gain unauthorized access.

13
New cards

Denial of Service (DoS)

An attack meant to make a service unavailable to its intended users.

14
New cards

Kali Linux

A Debian-based Linux distribution designed for digital forensics and penetration testing.