1. Introduction
This document summarizes key themes and concepts from the EC-Council Certified Ethical Hacker (CEH) v11 courseware, focusing on the fundamentals of ethical hacking, information security, and attack methodologies. This expanded briefing offers a detailed understanding of these areas, essential for professionals aiming to defend their organizations against cyber threats.
2. Information Security Overview
Information security is defined as the protection of information and systems that store, process, and transmit information from unauthorized access, disclosure, alteration, and destruction. It is crucial for safeguarding sensitive data within organizations. The courseware highlights five core elements essential to information security:
- Confidentiality: Ensures that information is accessible only to those authorized to have access. Breaches can occur through improper data handling or hacking attempts. Measures include data encryption and proper disposal of sensitive materials.
- Integrity: Ensures the trustworthiness of data by preventing unauthorized changes. Integrity is maintained through measures like checksums and access controls, which verify that data remains unaltered.
- Availability: Guarantees that systems and data are accessible when needed by authorized users. Ensuring availability involves redundant systems, antivirus software, and measures against DDoS attacks.
- Authenticity: Verifies the genuineness of communication, documents, or data. Controls like biometrics and digital certificates are used to confirm that users and data are genuine.
- Non-Repudiation: Ensures that a sender cannot deny sending a message and the recipient cannot deny receiving it. Digital signatures are commonly used to achieve non-repudiation.
3. Information Security Attacks
The motives and classifications of information security attacks are discussed in detail, emphasizing the goals and methods employed by attackers. These motives can range from disrupting business operations to stealing information for personal or political gain. The courseware classifies attacks into five categories:
- Passive Attacks: Involve intercepting and monitoring data without altering it, such as sniffing and eavesdropping.
- Active Attacks: Include tampering with data or disrupting services, like DDoS attacks, session hijacking, and SQL injection.
- Close-In Attacks: Occur when an attacker is physically close to the target, using methods like shoulder surfing or dumpster diving.
- Insider Attacks: Involve trusted individuals exploiting their access privileges to harm the organization, such as planting malware or stealing data.
- Distribution Attacks: Happen when hardware or software is tampered with before it reaches the target, often through backdoors inserted by manufacturers or during transit.
Understanding these classifications helps in developing comprehensive security measures to protect against various threats.