mcgraw hill gray hat hacking 2nd

577 270 0
mcgraw hill gray hat hacking 2nd

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... understanding of ethical hacking, this is the book for you We’re interested in your thoughts and comments Please e-mail us at book@grayhathackingbook.com Also, browse to www.grayhathackingbook.com for additional technical information and resources related to this book and ethical hacking Introduction to Ethical Disclosure ■ Chapter 1 ■ Chapter 2 ■ Chapter 3 Ethics of Ethical Hacking Ethical Hacking and the... processes and current models that provide direction In Part II we introduce more advanced penetration methods and tools that no other books cover today Many existing books cover the same old tools and methods that have xxiii Gray Hat Hacking: The Ethical Hacker’s Handbook xxiv been rehashed numerous times, but we have chosen to go deeper into the advanced mechanisms that real gray hats use today We discuss... the groundwork of the necessary ethics and expectations of a gray hat hacker This section: • Clears up the confusion about white, black, and gray hat definitions and characteristics • Reviews the slippery ethical issues that should be understood before carrying out any type of ethical hacking activities • Surveys legal issues surrounding hacking and many other types of malicious activities • Walks... Proper and Ethical Disclosure 1 This page intentionally left blank CHAPTER Ethics of Ethical Hacking • • • • Role of ethical hacking in today’s world How hacking tools are used by security professionals General steps of hackers and security professionals Ethical issues among white hat, black hat, and gray hat hackers This book has not been compiled and written to be used as a tool by individuals who... vendors say that they have malware more under control, it is rather that the hackers are changing their ways of doing business NOTE Chapter 6 goes in-depth into rootkits and how they work Although malware use has decreased, it is still the main culprit that costs companies the most money An interesting thing about malware is that many people seem to put it in a category different from hacking and intrusions... reported on January 25, 2007, that staff and student information had been obtained through a security breach by a former student The data had been copied to an iPod and included names, social security numbers, birth dates, phone numbers, and addresses PART I thought to have been introduced into the production line through another company that builds the iPods for Apple Gray Hat Hacking: The Ethical Hacker’s... dedicated to protecting against malicious hacking activity It has been proven over and over again that it is important to understand one’s enemies, including their tactics, skills, tools, and motivations Corporations and nations have enemies that are very dedicated and talented We must work together to understand the enemies’ processes and procedures to ensure that we can properly thwart their destructive... authors of this book want to provide the readers with something we believe the industry needs: a holistic review of ethical hacking that is responsible and truly ethical in its intentions and material This is why we are starting this book with a clear definition of what ethical hacking is and is not—something society is very confused about We have updated the material from the first edition and have... 54 55 55 57 60 62 62 ix Gray Hat Hacking: The Ethical Hacker’s Handbook x Case Studies Pros and Cons of Proper Disclosure Processes iDefense Zero Day Initiative Vendors Paying More Attention So What Should We Do from Here... to Gray Hat Hacking: The Ethical Hacker’s Handbook 6 Table 1-1 Downtime Losses (Source: Alinean) Business Application Estimated Outage Cost per Minute Supply chain management E-commerce Customer service ATM/POS/EFT Financial management Human capital management Messaging Infrastructure $11,000 $10,000 $3,700 $3,500 $1,500 $1,000 $1,000 $700 become one of the most sophisticated and automated forms of hacking .

Ngày đăng: 25/03/2014, 10:54

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan