Ethical Hackers,with their knowledge,help to define the parameters of defense.They do “controlled” attacks,previously authorized by the organization, to verify the system’s defenses.they create groups to learn new attack techniques,exploitations and vulnerabilities, among others,They work as researchers for the security field.
Attack is the secret of defense;defense is the planning of attack by Sun Tzu
Ethical hacking is divided in several Phases :
- Attack Planning
- Internet Access
- Test and Execution of an attack
- Gathering information
- Analysis
- Assessment and Diagnosis
- Final Report.
TCP/IP model
Topologies
HTTP and The Web (Internet)
No comments:
Post a Comment