02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In this book you will learn the various technologies and methodologies<br />

involved in becoming an ethical hacker. You will<br />

learn what it means to become an ethical hacker and the responsibilities<br />

you will be assuming both technically and ethically when you take on this role.<br />

The reality of your taking on the ethical hacker skill set is that companies and enterprise<br />

environments have had to quickly and effectively address the threats and vulnerabilities<br />

that they face. Through a robust and effective combination of technological, administrative,<br />

and physical measures, all these organizations have learned to address their given situation<br />

and head off major problems. Technologies such as virtual private networks (VPNs),<br />

cryptographic protocols, intrusion detection systems (IDSs), intrusion prevention systems<br />

(IPSs), access control lists (ACLs), biometrics, smart cards, and other devices have helped<br />

security. Administrative countermeasures such as policies, procedures, and other rules have<br />

also been strengthened and implemented over the past decade. Physical measures include<br />

cable locks, device locks, alarm systems, and similar devices. Your new role as an ethical<br />

hacker will deal with all of these items, plus many more.<br />

As an ethical hacker you must not only know the environment you will be working in,<br />

but also how to find weaknesses and address them as needed. However, before we get to<br />

all of that this chapter discusses the history of hacking and what it means to be an ethical<br />

hacker. We’ll also look the process of penetration testing and explore the importance of<br />

contracts.<br />

Hacking: A Short History<br />

<strong>Hacker</strong> is one of the most misunderstood and overused terms in the security industry. It<br />

has almost become the technological equivalent of a boogeyman, which so many either<br />

fear or end up ignoring. What is a hacker and where do we, as ethical hackers, fit in? Well,<br />

to answer that question let’s take a look at the history of hacking along with some notable<br />

events.<br />

The Early Days of Hacking<br />

As the story goes, the earliest hackers were a group of people who were passionate and<br />

curious about new technology. They were the equivalent of those modern-day individuals<br />

who not only want the latest technology, such as a smartphone or iPhone, but also want<br />

to learn all the juicy details about what the device does and what type of undocumented

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!