cyber security

?
  • Created by: RosieT26
  • Created on: 09-02-22 13:44
What is ethical hacking ?
Carried out with the permission of the system owner to cover all computer attack techniques. An ethical hacker attempts to bypass the security system and search for weak points that could be exposed by malicious hackers
1 of 7
What is penetration testing ?
A sub-set of ethical hacking that deals with the process of testing a computer system or network to find vulnerabilities that an attacker could exploit. The tests can be automated with software applications or can be preformed manually
2 of 7
What is targeted testing ?
Testing carried out by the organization IT team and the penetration testing team working together
3 of 7
What is external testing ?
to find out if an outsider attacker can get in how far they can get in once they have gained access
4 of 7
What is internal testing ?
To estimate how much damage a dissatisfied employee could cause
5 of 7
What is blind testing ?
To stimulate the actions and procedures of a real attacker by severely limiting the information given to the team preforming the test
6 of 7
What is foot printing ?
Is the first step in evaluating the security of any computer system .It involves gathering available information about the computer system or network devices that are attacker do it
7 of 7

Other cards in this set

Card 2

Front

What is penetration testing ?

Back

A sub-set of ethical hacking that deals with the process of testing a computer system or network to find vulnerabilities that an attacker could exploit. The tests can be automated with software applications or can be preformed manually

Card 3

Front

What is targeted testing ?

Back

Preview of the front of card 3

Card 4

Front

What is external testing ?

Back

Preview of the front of card 4

Card 5

Front

What is internal testing ?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all cybersecurity resources »