You are on page 1of 2

Digital nest institute

3 months course

Teacher: Nazeer
Email:

ETHICAL HACKING
___

Notes

introduction to web application


Any service offered over the internet is called a web application.

These are hosted in remote servers and which are accessible by hosts through browsers.

Types of web applications:

● Static web application. ...


● Dynamic web application. ...
● E-Commerce web application. ...
● Single-page web application. …

etc.,

https://www.javatpoint.com/web-application

Introduction to vulnerability assessment:


It is a process of reviewing security of the system and finding weaknesses in that system. After
finding weaknesses, recommended remedies or mitigation methods are suggested as solutions.
A vulnerability assessment is an automated test, meaning a tool does all of the work and
generates the report at the end. Penetration testing, on the other hand, is a manual
process relying on the knowledge and experience of a penetration tester to identify
vulnerabilities within an organization’s systems.

What are three authentication processes?

The three authentication factors are:

Knowledge Factor – something you know, e.g., password.

Possession Factor – something you have, e.g., mobile phone.

Inherence Factor – something you are, e.g., fingerprint.

You might also like