title

title

Hacker Techniques, Tools, and
Incident Handling
Chapter 1
Hacking: The Next Generation
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

Learning Objective and Key
Concepts
Learning Objective
 Explore the history and current state of hacking and
penetration testing, including their ethical and legal
implications.

Key Concepts
 Birth and evolution of hacking
 Ethical hacking and penetration testing in relation to
black and white-hat activities
 Laws and ethical standards for penetration testers
and ethical hackers
Hacker Techniques, Tools, and Incident Handling

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

Page 2

DISCOVER: CONCEPTS

Hacker Techniques, Tools, and Incident Handling

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

Page 3

History of Hacking
1990s
1980s
1970s

Pre 1970

First Hacking
Conference,
First Hacker
Polymorphic Codes
Groups, Bulletin
in Viruses
Boards

Early Viruses,
Phone Phreaking

Hacking as skillful
modification of systems

Hacker Techniques, Tools, and Incident Handling

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

Page 4

Modern Hacking and
Cybercriminals
 Transformation of hobbyist hacking to
cybercrime
 Cybercriminals seeking profits by aiming at
financial data, industry information, and
other valuable targets
 Emergence of national laws to counter
cyber attacks

Hacker Techniques, Tools, and Incident Handling

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

Page 5

Types of Hackers
 Black hats break into computer systems or
use them without authorization.
 Gray hats walk the line between legal and
illegal actions.
 White...

Similar Essays