Please enable JavaScript.
Coggle requires JavaScript to display documents.
Ethical Hacking - Coggle Diagram
Ethical Hacking
Role of security and penetration testers
Ethical hacker:
Access computer system or network
without authorization
Cracker
Break into systems to
steal or destroy data
.
Ethical hacker
Perform most of the
same activities with ower's permission
.
Script kiddies or packet monkeys
Younger,
Inexperienced hackers
who copy codes from knowledge hackers.
Penetration testers usually have:
A laptop computer
with multiple OSs
and
hacking tools
Hacktivist
A person who
hacks
computer systems for
political or social reasons
.
Penetration Testing Models
Job requirements
Perform
vulnerability, attack , and penetration assessments
in Intranet and wireless environments.
Perform
discovery and scanning
for open ports.
Apply
appropriate exploits
to
gain access
.
Participate in activities involving
application penetration
.
Produce reports documenting discoveries.
Debrief with the client
at the
conclusion
White box model
Tester is told about
network topology and technology
Tester is
permitted to interview IT
personnel and company employees.
Black box model
Staff does
not know
about the
test
.
Tester is
not given details
about
technologies used
Tests security personnel’s
ability to detect an attack
Grey box models
Cutting Edge Certification