- View Offline
- [Voiceover] An attack vector is a mechanism…by which someone gains unlawful entry into a system…and can include email, webpages,…wireless, automobiles, and the user.…The goal is to deliver a malicious payload…or other malicious acts by taking advantage…of system vulnerabilities or known weak spots to gain entry.…Old school viruses have been declining.…However, serious malware makers have progressed…to more aggressive attacks…using Trojan horses, rootkits, and spyware.…
Most methods involve programming…yet some involve social engineering.…An email and email attachments are one of the original…methods to send malware spam and bogus links…and continue to improve in sophistication.…Email attachments are handy…and are used by just about everyone.…While antivirus scans are tune to scan for viruses…in attachments, modern day malware is…polymorphic in nature and can change to elude detection.…To minimize this attack vector, keep antivirus updated…and educate users to use caution…when opening attachments.…
Webpages and pop-ups take advantage…
Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. Find more courses in the series on Lisa's author page.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases