An Introduction to Ethical Hacking
- "Do I Know This Already?" Quiz
- Foundation Topics
- Exam Preparation Tasks
Ethical hacking is a form of legal hacking done with the permission of an organization to help increase its security. In this sample chapter from Certified Ethical Hacker (CEH) Version 9 Cert Guide, 2nd Edition, explore the fundamental principles of the security triad—confidentiality, integrity, and availability.
This chapter introduces you to the world of ethical hacking. Ethical hacking is a form of legal hacking done with the permission of an organization to help increase its security. This chapter discusses many of the business aspects of penetration (pen) testing. How should a pen test be performed, what types can be performed, what the legal requirements are, and what type of report should be delivered are all basic items that you need to know before you perform any type of security testing. However, first, you need to review some security basics. That’s right, as my mom always said, “You must walk before you can run!” This chapter starts with a discussion of confidentiality, integrity, and availability. Next, it moves on to the subject of risk analysis, and it finishes up with the history of hacking and a discussion of some of the pertinent laws.
“Do I Know This Already?” Quiz
The “Do I Know This Already?” quiz allows you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 1-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Review Questions.”
Table 1-1 “Do I Know This Already?” Section-to-Question Mapping
Foundation Topics Section |
Questions |
Security Fundamentals |
1 |
Security Testing |
8–10 |
Hacker and Cracker Descriptions |
3, 4, 7 |
Ethical Hackers |
5 |
Test Plans–Keeping It Legal |
6 |
Ethics and Legality |
2 |
What are the three main tenants of security?
Confidentiality, integrity, and availability
Authorization, authentication, and accountability
Deter, delay, and detect
Acquire, authenticate, and analyze
Which of the following laws pertains to accountability for public companies relating to financial information?
FISMA
SOX
18 U.S.C. 1029
18 U.S.C. 1030
Which type of testing occurs when individuals know the entire layout of the network?
Black box
Gray box
White box
Blind testing
Which type of testing occurs when you have no knowledge of the network?
Black box
Gray box
White box
Blind testing
Which form of testing occurs when insiders are not informed of the pending test?
Black box
Gray box
White box
Blind testing
How is ethical hacking different from simple hacking?
Ethical hackers never launch exploits.
Ethical hackers have written permission.
Ethical hackers act with malice.
Ethical hackers have permission.
Which type of hacker is considered a good guy?
White hat
Gray hat
Black hat
Suicide hacker
Which type of hacker is considered unethical?
White hat
Gray hat
Black hat
Brown hat
Which type of hacker will carry out an attack even if the result could be a very long prison term?
White hat
Gray hat
Black hat
Suicide hacker
Which type of hacker performs both ethical and unethical activities?
White hat
Gray hat
Black hat
Suicide hacker