Ethical Hacking and Penetration Testing Guide



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə17/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   13   14   15   16   17   18   19   20   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Important Terminologies
Let’s now briefly discuss some of the important terminologies that I will be using throughout this 
book.
Asset
An asset is any data, device, or other component of the environment that supports information-
related activities that should be protected from anyone besides the people that are allowed to view 
or manipulate the data/information.


Introduction to Hacking
◾ 
3
Vulnerability
Vulnerability is defined as a flaw or a weakness inside the asset that could be used to gain unau-
thorized access to it. The successful compromise of a vulnerability may result in data manipula-
tion, privilege elevation, etc.
Threat
A threat represents a possible danger to the computer system. It represents something that an orga-
nization doesn’t want to happen. A successful exploitation of vulnerability is a threat. A threat may 
be a malicious hacker who is trying to gain unauthorized access to an asset.
Exploit
An exploit is something that takes advantage of vulnerability in an asset to cause unintended or 
unanticipated behavior in a target system, which would allow an attacker to gain access to data 
or information.
Risk
A risk is defined as the impact (damage) resulting from the successful compromise of an asset. For 
example, an organization running a vulnerable apache tomcat server poses a threat to an organiza-
tion and the damage/loss that is caused to the asset is defined as a risk.
Normally, a risk can be calculated by using the following equation:
Risk = Threat * vulnerabilities * impact
What Is a Penetration Test?
A penetration test is a subclass of ethical hacking; it comprises a set of methods and procedures 
that aim at testing/protecting an organization’s security. The penetration tests prove helpful in 
finding vulnerabilities in an organization and check whether an attacker will be able to exploit 
them to gain unauthorized access to an asset.

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   13   14   15   16   17   18   19   20   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin