Professional Documents
Culture Documents
and
Ethical Hacking
Unit 1: Introduction and Design Principles
Importance of the Subject
• Cyber security
• how to defend devices and services from electronic attacks by nefarious actors
such as hackers, spammers, and cybercriminals.
• Today's professionals focus
• On determining the best way to defend all assets, from computers and
smartphones to networks and databases, from attacks.
• Ethical Hacking
• An authorized practice of detecting vulnerabilities in an application, system, or
organization’s infrastructure and bypassing system security to identify potential
data breaches and threats in a network.
• Aim to investigate the system or network for weak points that malicious hackers
can exploit or destroy.
• They can improve the security footprint to withstand attacks better or divert them.
Recent Ransomware Attacks
Ransomware is a type of malware that prevents or limits users from accessing their system, either by
locking the system's screen or by locking the users' files until a ransom is paid.