Chapter 1

Introduction to Ethical Hacking

In This Chapter

arrow Understanding hackers’ and malicious users’ objectives

arrow Examining how the ethical hacking process came about

arrow Understanding the dangers your computer systems face

arrow Starting to use the ethical hacking process for security testing

This book is about testing your computers and networks for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them.

Straightening Out the Terminology

Most people have heard of hackers and malicious users. Many have even suffered the consequences of their criminal actions. So who are these people? And why do you need to know about them? The next few sections give you the lowdown on these attackers.

remember In this book, I use the following terminology:

  • Hackers (or external attackers) try to compromise computers, sensitive information, and even entire networks for ill-gotten gains — usually from the outside — as unauthorized users. Hackers go for almost any system ...

Get Hacking For Dummies, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.