THe EssentialsOSI Reference ModelTCP/IP StackTCP HandshakeSYN -> SYN-ACK -> ACK ARP
Security COntrolsBusiness Analysis
CIA Triad
Confidentiality != authentication - MAC address spoofing is an authentication attack Common Criteria for Information Technology Security Evaluation
Baselines - provide the minimum security necessary Guidelines - flexible or recommended actions Procedures - step by step instructions Script Kiddie - uneducated in security methods, but uses tools that are freely available to perform malicious activities Phreaker - manipulates telephone systems The Hats
Hacktivist - someone who hacks for a cause Suicide Hackers - do not case about any impunity to themselves; hack to get the job done Cyberterrorist - motivated by religious or political beliefs to create fear or disruption State-Sponsored Hacker - hacker that is hired by a government Attack Types
Hacking Phases
Cracker - uses tools for personal gain or destructive purposes Penetration Test
Mostly Sourced from:
https://github.com/scottymcraig/CEHv10StudyGuide/blob/master/1%20-%20Essential%20Knowledge.md
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |