You are on page 1of 34

DFS40093 ETHICAL

HACKING
CHAPTER 1
INTRODUCTION TO HACKING, ETHICS AND
LEGALITY
Learning Outcome
• Follow ethical hacking
• Ethical hacker responsibility
• Ethical hacker terminology
• Hacking methodologies

• Display type of hacker


• Type of hacker
• Testing box
• Ethical hacking skills
• conduct ethical hacking
• Legal implication
• Rules of ethical hacking
• Security audit
• Rules in ethical hacking
Exercise
• Discuss with your group any 1 (ONE) computer hacking real case study.
Explain about the attacker profile, target profile, motive and impact of the
attack.
• Task:
• This is group exercise (3-4 students)
• Prepare a simple presentation slide (2 – 4 pages) in .pptx format
• Submit task in Cidos platform
Exercise
• Discuss with your group any 1 (ONE) cyber law in Malaysia. Explain about
the law description, scope and limitation.
• Task:
• This is group exercise (3-4 students)
• Prepare a simple presentation slide (2 – 4 pages) in .pptx format
• Submit task in Cidos platform

You might also like