CYBER TERRORISM

CYBER TERRORISM- THE DARK SIDE OF THE WEB WORLD “Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Computers and the internet are becoming an essential … Read more

Disadvantages of Ethical Hacking

As with all types of activities which have a darker side, there will be…..dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include: The ethical hacker using the knowledge they gain to do malicious hacking activities Allowing the company’s financial and banking details to be seen The possibility that the ethical hacker will send … Read more

The Advantages of Ethical Hacking

Testing Security Measures The primary advantage of having ethical hackers on a company’s payroll is that the hackers are allowed to test a company’s security measures in a controlled, safe environment. These hackers can help companies determine which of their computer security measures are effective, which measures need updating, and which ones pose little to … Read more

TYPES OF HACKING

One of the most frequent threats of hacking is those faced by the websites. It is very common to see a particular website or online account being hacked open intentionally using unauthorized access and its contents being changed or made public. The web sites of political or social organizations are the frequent targets by groups … Read more

HOW VULNERABILITIES ARE IDENTIFIED

Vulnerabilities need to be identified by both the penetration tester and the vulnerability scanner. The steps are similar for the security tester and an unauthorized attacker. The attacker may choose to proceed more slowly to avoid detection, but some penetration testers will also start slowly so that the target company can learn where their detection … Read more

PENETRATION TESTING VS VULNERABILITY ASSESSMENT

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has more of an emphasis on gaining as much access as possible while vulnerability assessment places the emphasis on identifying areas that are vulnerable to the attack. An automated vulnerability scanner will often identify possible vulnerabilities … Read more

TYPES OF PENETRATION TESTS

Testing is about variation—finding the things in the software and its environment that can be varied, varying them, and seeing how the software responds. The goal is to ensure that the software performs reliably and securely under reasonable and even unreasonable production scenarios. So the most fundamental planning a tester can do is to understand … Read more