TAILIEUCHUNG - Lecture Professional Practices in IT: Lecture 22 - Saqib Iqbal

Lecture 22 - Ethical hacking. After studying this chapter you will be able to understand: Ethical hacking, what you can do legally as an ethical hacker, what you cannot do as an ethical hacker. | Lecture 22 Ethical Hacking Objectives Ethical hacking What you can do legally as an ethical hacker What you cannot do as an ethical hacker Hacker and Ethical hacker Hackers Access computer system or network without authorization Breaks the law; can go to prison Ethical hacker Performs most of the same activities but with owner’s permission Employed by companies to perform penetration tests Penetration test vs. Security test Penetration test Legal attempt to break into a company’s network to find its weakest link Tester only reports findings Security test More than an attempt to break in; also includes analyzing company’s security policy and procedures Tester offers solutions to secure or protect the network Penetration test & Security test Programming languages used by experienced penetration testers Practical Extraction and Report Language (Perl) C Tiger box Collection of OSs and hacking tools Helps penetration testers and security testers conduct vulnerabilities assessments and attacks Penetration-Testing Methodologies Penetration-Testing Methodologies White box model Black box model Gray box model White box model Tester is told everything about the network topology and technology Tester is authorized to interview IT personnel and company employees Makes tester job a little easier Penetration-Testing Methodologies (continued) Black box model Company staff does not know about the test Tester is not given details about the network Burden is on the tester to find these details Tests if security personnel are able to detect an attack Gray box model Hybrid of the white and black box models Company gives tester partial information Certification Programs for Network Security Personnel Penetration testers need to have the technical skills good understanding of networks the role of management in an organization. Network security certification programs Certified Ethical Hacker (CEH) OSSTMM Professional Security Tester

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.