CATEGORY: CyberBook
9.0 – Malware – Variants, Infections and Effects
The following are some of the major variants of malware:
Virus: A virus is a program that reproduces its own code by attaching itself to...
8.4 – National Security
Man has been at war with each other for centuries now. Initially, it began with killing people and then went to attacking countries with...
8.3 – Testing Classification
Based on testing methodologies, we can divide penetration testing into three different groups:
Black Box Testing
White Box...
8.2 – Hacking Process
The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker....
8.1 – Hacking Business
Hackers can be divided into three groups:
White Hat: Ethical Hacker (Good Guy)
Black Hat: Malicious Hacker (Bad...