ethical hacking chapt1

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 19

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

20 Terms

1
Ethical Hacker
A security professional who uses hacking techniques legally and with permission to identify and fix security vulnerabilities.
New cards
2
Penetration Test
A simulated cyberattack to identify and exploit vulnerabilities in a system.
New cards
3
Black Box Model
A penetration testing method where the tester has no prior knowledge of the system being tested.
New cards
4
Certified Ethical Hacker (CEH)
A certification that validates an individual’s knowledge of ethical hacking techniques and security threats.
New cards
5
Certified Information Systems Security Professional (CISSP)
A certification for professionals who develop and manage security policies and procedures.
New cards
6
Crackers
Malicious hackers who break into systems to steal or damage data.
New cards
7
Gray Box Model
A penetration testing approach where the tester has partial knowledge of the system.
New cards
8
Hacker
A person skilled in computer systems who may use their knowledge for ethical or malicious purposes.
New cards
9
Hacktivist
A hacker who attacks systems for political or social activism reasons.
New cards
10
Institute for Security and Open Methodologies (ISECOM)
An organization that develops open security testing methodologies.
New cards
11
Offensive Security Certified Professional (OSCP)
A hands-on ethical hacking certification focused on penetration testing.
New cards
12
Open Source Security Testing Methodology Manual (OSSTMM)
A framework for security testing and assessments.
New cards
13
OSSTMM Professional Security Tester (OPST)
A certification for professionals who use OSSTMM methodologies in security testing.
New cards
14
Packet Monkeys
Hackers who launch pre-scripted attacks without understanding them.
New cards
15
Red Team
A group that acts as adversaries to test an organization's security defenses.
New cards
16
Script Kiddies
Inexperienced hackers who use pre-made tools to attack systems without deep knowledge.
New cards
17
Security Test
A process to evaluate the security of a system or network.
New cards
18
SANS Institute
A cybersecurity training and certification organization.
New cards
19
Vulnerability Assessment
The process of identifying and prioritizing security weaknesses in a system.
New cards
20
White Box Model
A penetration testing method where the tester has full knowledge of the system being tested.
New cards
robot