null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
727325
HACKING
Description
Mind Map on HACKING, created by anis_livesoul on 07/04/2014.
Mind Map by
anis_livesoul
, updated more than 1 year ago
More
Less
Created by
anis_livesoul
over 10 years ago
86
2
0
Resource summary
HACKING
Unauthorized access into computers
Spread computer worms and viruses
MOTIVE
Profit
Protest
Challenge
TYPE
White Hat
Breaks security for non-malicious reasons
To test their own security system
Perform tests and assessments within a contractual agreement.
Black Hat
Break security for personal gain
To destroy data or make the network unusable
Grey Hat
Combination of White + Black Hat
Hack into system and notify the administrator - the system security is defect
Offer to correct the defect
Script kiddie
non-expert
using pre-packaged automated tools written by others
TECHNIQUES
Password cracking : repeatedly try guesses for the password.
Phishing: masquerades another website or system until user revealing confidential information, such as user names and passwords
Social engineering: pose as a user who cannot get access to his or her system.
Keystroke logging: to record every keystroke on an affected machine for later retrieval,
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Hacking quiz
Luigi3106 YT
Chapter 5: Keeping data safe and secure, keywords
Victoria Heppinstall
Certified Ethical Hacker v8
Antonio Baymon
Types of Attacks
River L.
Cyber Crime and Social Engineering
Laiyla ♡
Memutus Koneksi WiFi Orang Lain
mnh blog
Security
kvromant
Security Measures
md.ayman
hacking
Derek johnson
CYBER SECURITY AND CRIME- email scams
Dillani Arulananthan
ethical hacking toets
kiroy zadel
Browse Library