Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity

Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity

ISBN13: 9781799865049|ISBN10: 1799865045|EISBN13: 9781799865063
DOI: 10.4018/978-1-7998-6504-9.ch001
Cite Chapter Cite Chapter

MLA

Conteh, Nabie Y. "Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity." Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, edited by Nabie Y. Conteh, IGI Global, 2021, pp. 1-18. https://doi.org/10.4018/978-1-7998-6504-9.ch001

APA

Conteh, N. Y. (2021). Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity. In N. Conteh (Ed.), Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (pp. 1-18). IGI Global. https://doi.org/10.4018/978-1-7998-6504-9.ch001

Chicago

Conteh, Nabie Y. "Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity." In Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, edited by Nabie Y. Conteh, 1-18. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-6504-9.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter will discuss the important topic of ethical hacking, also known as penetration testing. It will start by explaining the constituents of ethical hacking: scope and goal setting, exploitation, and documentation. The authors will define and explain the reasons for the rapid rise in cyber-crimes and their socio-economic impact. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, its importance, and the role it plays in deterring future and potential hackers. The chapter will analyze the various types of malware and the steps to follow to become an ethical hacker. It will further describe social engineering, the types of cyber-attacks, the phases of attack, testing for vulnerabilities, and it will put forward a list of countermeasures. The chapter will end by detailing the steps to be taken in the documentation process and crafting the executive summary.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.