100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
What is ethical hacking? $3.49   Add to cart

Other

What is ethical hacking?

 5 views  0 purchase
  • Course
  • Institution

What Is Ethical Hacking? $ Cyber Security: Practices and Types of Hackers $ Ransomware Attack: WannaCry Case Study $ Ethical Hacking: Importance and Process Cyber Security: Practices and Types of Hackers ============================================= Table of Contents ----------------- ...

[Show more]

Preview 1 out of 2  pages

  • May 6, 2024
  • 2
  • 2023/2024
  • Other
  • Unknown
avatar-seller
What Is Ethical Hacking?

$ Cyber Security: Practices and Types of Hackers
$ Ransomware Attack: WannaCry Case Study
$ Ethical Hacking: Importance and Process


Cyber Security: Practices and Types of Hackers
============================================= Table of Contents ----------------- -
[De nition and Importance of Cyber Security](#de nition) - [Best Practices for Cyber Security]
(#practices) - [Types of Hackers](#hackers) De nition and Importance of Cyber Security
-------------------------------------------- Cyber security is the practice of protecting internet-
connected systems, including hardware, software, and data, from theft, damage, or unauthorized
access. It is important to protect sensitive information and prevent nancial loss. Best Practices
for Cyber Security --------------------------------- * Install and update anti-virus and anti-malware
software * Use strong, unique passwords and enable two-factor authentication * Regularly backup
important data * Keep software and operating systems up-to-date * Use a rewall and encrypt
sensitive data * Educate employees about security best practices * Implement access controls
and user permissions * Use a virtual private network (VPN) when accessing public Wi-Fi Types of
Hackers --------------- * **Black Hat Hackers:** also known as crackers, are malicious hackers
who break into systems with the intent to steal or damage information. * **White Hat Hackers:**
also known as ethical hackers, are hackers who are hired to nd and x security vulnerabilities. *
**Grey Hat Hackers:** are hackers who operate in a legal grey area, often breaking into systems
without permission but with good intentions. * **Script Kiddies:** are inexperienced hackers who
use pre-packaged hacking tools without fully understanding how they work. * **Hacktivists:** are
hackers who use their skills to promote a social or political agenda. * **Nation-State Hackers:**
are hackers who are supported by a national government and use their skills to steal sensitive
information or disrupt critical infrastructure. It is important to be aware of these di erent types of
hackers and the threats they pose in order to implement e ective cyber security measures




Ransomware Attack: WannaCry Case Study

WannaCry Ransomware Attack Case Study
Ethical Hacking: Importance and Process (this topic will not be covered in this notes)
Cyber Security: Practices and Types of Hackers (this topic will not be covered in this notes)

WannaCry Ransomware Attack
• WannaCry is a ransomware attack that emerged in May 2017
• It spread rapidly, infecting over 230,000 computers in 150 countries in just a few days
• The attack exploited a vulnerability in the Windows operating system, speci cally in the Server
Message Block (SMB) protocol

Impact of WannaCry Attack
• Financial losses estimated to be in the hundreds of millions of dollars
• Disrupted critical services in hospitals, government agencies, and businesses
• Highlighted the importance of cyber security and the need for regular software updates and
patching

Characteristics of WannaCry Attack
• Used an exploit leaked from the NSA, known as EternalBlue
• Encrypted les on the infected computer and demanded a ransom to decrypt them
• Spread quickly using the SMB protocol to infect other computers on the same network

Prevention and Mitigation
• Regularly updating and patching software
• Implementing rewalls and access controls
• Backing up critical data and testing backup systems




fi

fi fi fi fi ff fi fi fi fifi ff

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller tgblucifer. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $3.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$3.49
  • (0)
  Add to cart