CATEGORY: Cybersecurity and
8.4 – National Security
Man has been at war with each other for centuries now. Initially, it began with killing people and then went to attacking countries with...
8.3 – Testing Classification
Based on testing methodologies, we can divide penetration testing into three different groups:
Black Box Testing
White Box...
8.2 – Hacking Process
The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker....
8.1 – Hacking Business
Hackers can be divided into three groups:
White Hat: Ethical Hacker (Good Guy)
Black Hat: Malicious Hacker (Bad...
8.0 – Basics of Hacking
Hacking is the practice of changing a computer software or hardware to achieve a goal outside of the creator’s unique purpose. Generally, people who...