Transcription of Chapter 1 Introduction to Ethical Hacking
{{id}} {{{paragraph}}}
Chapter 1 Introduction to Ethical HackingIn This Chapter Understanding hacker objectives Outlining the differences between Ethical hackers and malicious hackers Examining how the Ethical Hacking process has come about Understanding the dangers that your computer systems face Starting the Ethical Hacking processThis book is about Hacking ethically the science of testing your comput-ers and network for security vulnerabilities and plugging the holes youfind before the bad guys get a chance to exploit ethicalis an often overused and misunderstood word, the Merriam-Webster dictionary defines ethicalperfectly for the context of this book andthe professional security testing techniques that I cover that is, conformingto accepted professional standards of conduct. IT practitioners are obligated toperform all the tests covered in this book aboveboard and only after permis-sion has been obtained by the owner(s) of the systems hence the disclaimerin the Hackers Beget Ethical HackersWe ve all heard of hackers.
Chapter 1 Introduction to Ethical Hacking In This Chapter ... ers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them. ... Hackers break into buildings, computer rooms, or other areas containing crit-
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}