100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Samenvatting Ethical Hacking (ICT.IDS.EH1.V20)

Rating
-
Sold
4
Pages
11
Uploaded on
23-11-2021
Written in
2020/2021

Dit document bevat een samenvatting en lijst van alle woorden, terminologie en afkortingen die in de toets kunnen voorkomen. Per college is de kerninformatie samengevat en compact uiteengezet. Alle onderdelen die in de toets voorkomen worden behandeld en hack-methodes worden beknopt beschreven. Verder wordt er o.a. uitgelegd over onder andere penetratietests, target scanning, application layer vulnerabilities, keylogging, hashes, Denial of Service attacks en mobile attacks.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
November 23, 2021
Number of pages
11
Written in
2020/2021
Type
Summary

Subjects

Content preview

Samenvatting
Ethical Hacking
Gebaseerd op de slides, Wikipedia, Google, colleges en voorkennis. Good luck!


Dictionary 2
Abbreviations: 2
Terms: 2
Phases of ethical hacking: 3

Week 1 4
Penetration test types: 4
Types of hackers: 4
Breaches: 4
The BAD pyramid: (build attack defend) 4
Social Engineering: 4

Week 2 5
Target scanning process 5
Port Scanning 5
Sniffing 5

Week 3 6
Application Layer Vulnerabilities 6
Tools 6
SQL Injection Attacks 6
XSS Attacks 6
Clickjacking attacks 7

Week 4 8
Keyloggers 8
Hashes 8
Crypto attacks 8

Week 5 9
Denial of Service Attacks 9
CPU Attacks 9
Application Attacks 9

Week 6 10
Mobile attacks 10

Week 7 11

, Dictionary

Abbreviations:
● TOE: Target of Evaluation (product or system that is the subject of the
evaluation)
● CEH: Certified Ethical Hacker
● PTES: Penetration Testing Execution Standard (consists of 7 main sections
covering everything related to a penetration test)
● WSTG: Web Security Testing Guide
● MSTG: Mobile Security Testing Guide
● ISSAF: Information Systems Security Assessment Framework (reference
source of penetration testing)
● CVE: Common Vulnerabilities and Exposures (A list of publicly known
cybersecurity vulnerabilities)
● CVSS: Common Vulnerability Scoring System (Standard for assessing the
severity of vulnerabilities)
● MITM: Man in the Middle
● RCE: Remote Code Execution
● RAT: Remote Access Tool
● DoS: Denial of Service
● DDoS: Distributed DOS
● DRDoS: Distributed Reflection Denial of Service
● CPDoS: Cache Poisoned Denial of Service
● MAC: Media Access Control (Hardware address of the NIC)
● NIC: Network Interface Controller (Physical network hardware such as a
WiFi adapter or Ethernet module)
● ARP: Address Resolution Protocol (Protocol used for discovering the link
layer address, mapping IPv4 addresses to MAC addresses)
● WAN: Wide Area Network (Public network that extends over a large
geographic area)
● LAN: Local Area Network (Private network within a limited area such as a
building)
● WLAN: Wireless Local Area Network (Wireless equievelant of LAN)

Terms:
● Threat: potential violation of security
● Exploit: software or technology that takes advantage of a vulnerability
● Vulnerability: software flaw, implementation error, logic design error
$4.85
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Kiwis

Get to know the seller

Seller avatar
Kiwis Hogeschool Windesheim
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
4 year
Number of followers
3
Documents
2
Last sold
2 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions