Project Report Synopsis Free Sample for IGNOU Information Security and Ethical Hacking
- Home
- IGNOU Project Reports
- Project Report Synopsis Free Sample for IGNOU Information Security and Ethical Hacking
- On
- By
- 0 Comment
- Categories: IGNOU Project Reports
Project Report Synopsis Free Sample for IGNOU Information Security and Ethical Hacking
Hackers (or external attackers) try to compromise computers and sensitive information for ill-gotten gains — usually from the outside — as an
unauthorized user. Hackers go for almost any system they think they can
compromise. Some prefer prestigious, well-protected systems, but hack-
ing into anyone’s system increases their status in hacker circles.
Rogue insiders (or internal attackers) try to compromise computers and
sensitive information from the inside as authorized users. Rogue insid-
ers go for systems they believe can be compromised for ill-gotten gains
or revenge.
Malicious attackers are, generally speaking, both hackers and rogue
insiders. For the sake of simplicity, I refer to both as hackers and specify
hacker or rogue insider only when I need to drill down further into their
tools, techniques, and ways of thinking.
Ethical hackers (or good guys) hack a system to discover vulnerabilities
for the purpose of protecting computers against illicit entry, abuse, and
misuse.
Download SAMPLE Material:-
Ethical Hacking Detail Theory
Ethical Hacking Introduction