has intentionally blurred sections.
Sign up to view the full version.
5 CHAPTER 1: INTRODUCTION TO ETHICAL HACKING CHAPTER 1: INTRODUCTION TO ETHICAL HACKING 1.1 INTRODUCTION The Internet is still growing and e-commerce is on its advance. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more complicated and user friendly . Therefore, Security is a hot topic and quite some effort is spend in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys between the ones who are trying hard to keep information secured and the ones who are trying to get prohibited access to this information. Securing an information technology environment does not just consist of a bunch of actions which can be taken and then everything can be forgotten there is no fire and forget solution - security is a never ending process. OBJECTIVE COVERED IN THIS CHAPTER: INTRODUCTION ETHICAL HACKING TERMINOLOGY THE JOB ROLE OF AN ETHICAL HACKER TYPES OF ETHICAL HACKERS ETHICAL HACKERS VERSUS CRACKER WHAT DO ETHICAL HACKERS DO? AN ETHICAL HACKER’S SKILL SET