What is Ethical Hacking?
Adult · Computer Science · 60 min
Lesson Preview
Learning Objective
I can define ethical hacking and its importance in cybersecurity. I can identify the different types of threats that companies have to guard against.
- 1
Social engineering involves tricking users into divulging confidential information or configuring systems to allow attackers entry, with phishing and pretexting being common types of attacks.
- 2
A buffer overflow attack occurs when input exceeds the buffer's capacity, potentially crashing the system or allowing attackers to inject malicious code, while code injection involves inserting malicious commands, often in SQL, to manipulate databases.
- 3
Hackers exploit vulnerabilities, sometimes using zero-day exploits before patches are available, and can create botnets from compromised computers for activities like DDoS attacks, highlighting the importance of cybersecurity practices and software updates.


