network1 - EthicalHacking and NetworkDefense Objectives

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking  and  Network Defense 
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Objectives Describe the role of an ethical hacker Describe what you can do legally as an  ethical hacker Describe what you cannot do as an ethical  hacker 2
Background image of page 2
Ethical Hacking Ethical hackers Employed by companies to perform penetration tests Penetration test Legal attempt to break into a company’s network to  find its weakest link Tester only reports findings, does not solve problems Security test More than an attempt to break in; also includes  analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the  network 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Penetration Testers Hackers Access computer system or network without authorization Breaks the law; can go to prison Crackers Break into systems to steal or destroy data U.S. Department of Justice calls both hackers
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2010 for the course SECB 408 taught by Professor Wassimelhaj during the Spring '07 term at United Arab Emirates University.

Page1 / 15

network1 - EthicalHacking and NetworkDefense Objectives

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online