HACKING

Beschreibung

Mindmap am HACKING, erstellt von anis_livesoul am 07/04/2014.
anis_livesoul
Mindmap von anis_livesoul, aktualisiert more than 1 year ago
anis_livesoul
Erstellt von anis_livesoul vor mehr als 10 Jahre
86
2

Zusammenfassung der Ressource

HACKING
  1. Unauthorized access into computers
    1. Spread computer worms and viruses
    2. MOTIVE
      1. Profit
        1. Protest
          1. Challenge
          2. TYPE
            1. White Hat
              1. Breaks security for non-malicious reasons
                1. To test their own security system
                  1. Perform tests and assessments within a contractual agreement.
                  2. Black Hat
                    1. Break security for personal gain
                      1. To destroy data or make the network unusable
                      2. Grey Hat
                        1. Combination of White + Black Hat
                          1. Hack into system and notify the administrator - the system security is defect
                            1. Offer to correct the defect
                            2. Script kiddie
                              1. non-expert
                                1. using pre-packaged automated tools written by others
                              2. TECHNIQUES
                                1. Password cracking : repeatedly try guesses for the password.
                                  1. Phishing: masquerades another website or system until user revealing confidential information, such as user names and passwords
                                    1. Social engineering: pose as a user who cannot get access to his or her system.
                                      1. Keystroke logging: to record every keystroke on an affected machine for later retrieval,
                                      Zusammenfassung anzeigen Zusammenfassung ausblenden

                                      ähnlicher Inhalt

                                      Hacking quiz
                                      Luigi3106 YT
                                      Chapter 5: Keeping data safe and secure, keywords
                                      Victoria Heppinstall
                                      Certified Ethical Hacker v8
                                      Antonio Baymon
                                      Types of Attacks
                                      River L.
                                      Cyber Crime and Social Engineering
                                      Laiyla ♡
                                      Memutus Koneksi WiFi Orang Lain
                                      mnh blog
                                      Security
                                      kvromant
                                      Security Measures
                                      md.ayman
                                      hacking
                                      Derek johnson
                                      CYBER SECURITY AND CRIME- email scams
                                      Dillani Arulananthan
                                      ethical hacking toets
                                      kiroy zadel