1/21
Flashcards based on the Introduction to Ethical Hacking lecture.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the purpose of a penetration tester?
To conduct a penetration test.
What is a Black Hat Hacker?
Hackers operating on the wrong side of the law; they may or may not have an agenda
What are Cyberterrorists known for?
A new form of hackers trying to destroy targets and cause bodily harm. Sometimes their actions are not stealthy.
Who created the Internet Worm in 1988?
Robert T. Morris
Which hacking group targeted famous individuals like Donald Trump?
Anonymous
What is the definition of Cyberlaw?
Cyberlaw can touch on many elements including contracts, interactions between suppliers and consumers, policies for handling of data and accessing corporate systems, complying with government regulations and programs etc.
What US code section relates to fraud and electronic mail?
18 U.S.C. $1037
What UAE law was issued in 2012 regarding cybercrime?
The UAE Cybercrime Law No 5 of 2012, issued by President His Highness Shaikh Khalifa Bin Zayed Al Nahyan
What is identity theft?
Stealing of the information that allow a person to impersonate other person(s) for illegal purposes, mainly financial gains such as opening credit card/bank account, obtaining rental properties and etc.
What is Network intrusion?
Most common type of attack; it leads to other cybercrimes Example: Breaking into your neighbour’s WiFi network will open a lot of opportunities of attack.
What is Embezzlement?
A form of financial fraud involving theft and/or redirection of funds
What is the aim of the Penetration Testing Methodology?
To enhance opportunities and reduce threats in an organization
What are the three typical types of testing?
Black-Box Testing, Grey-Box Testing, White-Box Testing
What is External Testing?
Execute the test from a remote location much like a real attacker; the pentester will be extremely limited on information of the target
What is Internal Testing?
This test simulates an “insider attack”
What should a contract include for penetration testing?
Systems to be evaluated, Perceived risks,Timeframe, Actions to be performed when a serious problem is found, Deliverables
What is the CIA Triad?
Confidentiality, Integrity, Availability
What is the goal of confidentiality in the CIA triad?
Keep information secret/private from those who are not authorized
What is the goal of integrity in the CIA triad?
Keep information in a format that retains its original purpose and meaning
What is the goal of availability in the CIA triad?
Keep information and resources available to those legitimate users
What is a Certified Ethical Hacker (CEH)?
An ethical hacker that has mastered the hacking technologies
What is one of the most popular SANS Institute documents?
Top 20 list