V3nom's
  • Welcome
  • Getting Started
    • CEH v13
    • Basics of Networking
      • Network Models
        • Application Layer in OSI ->
        • Presentation Layer in OSI ->
          • Comprehensive list of character encoding formats
        • Session Layer in OSI ->
        • Transport Layer in OSI ->
        • Network Layer in OSI ->
        • Data Link Layer in OSI ->
        • Physical Layer ->
    • Arch Linux Installation Guide
    • How to add VBoxLinuxAdditions.run in Debian Based Linux Distros
    • C# Programming Language
  • Research Papers
    • Word Embedding for Anomaly Detection
    • Build your own Redis
    • Blockchain Technology
    • Interactive blocks
    • OpenAPI
    • Integrations
  • Risk Analysis & Mitigation Notes
    • Risk Analysis & Mitigation
      • Unit 1: An Introduction to Risk Management
      • Unit 2: The Threat Assessment Process
      • Unit 3: Vulnerability Issues
      • Unit 4 ( Risk Analysis & Mitigation )
      • Unit 5 ( Risk Analysis & Mitigation )
  • Ethical Hacking
    • Ethical Hacking Syllabus
      • Unit I: Introduction ( English )
      • Unit I: Introduction ( Hinglish )
      • Unit II: The Business Perspective ( English )
      • Unit II: The Business Perspective ( Hinglish )
      • Unit III: Preparing for a Hack ( English )
      • Unit III: Preparing for a Hack ( Hinglish )
      • Unit IV: Enumeration ( English )
      • Unit IV: Enumeration ( Hinglish )
      • Unit V: Deliverables ( English )
      • Unit V: Deliverables ( Hinglish )
  • .NET Framework Notes
    • .NET Framework Syllabus
      • Unit - I ( Hinglish Version )
      • Unit - I ( English - Version for exams )
      • Unit - II ( Hinglish Version - For Understanding )
      • Unit - II (English Version - for papers)
      • Unit - III ( Hinghlish Version )
      • Unit - III ( English - Version )
      • Unit - IV ( Hinglish Version )
      • Unit - IV ( English Version )
      • Unit - V ( Hinglish Version )
      • Unit - V ( English Version )
  • IOT
    • unit 1
    • unit 2
    • unit 3
    • unit 4
    • unit 5
  • AD-Hoc and Wireless Networks
    • Unit 1 ( Hinglish )
    • unit 2 Hinglish
    • All assignments answers with questions
    • Mind Maps for All Questions
    • Page
  • Distributed Systems
    • Unit 1
    • Unit 2
    • Unit 3
    • Unit 4
    • Unit 5
  • Group 1
    • 1’s and 2’s Complement
    • Direct Memory Access
    • Register Transfer Level
    • Interrupt-Based Input/Output (I/O)
    • Memory and CPU Design
    • Instruction Cycle
    • Addressing Modes
    • Pipelining
    • Three Types of Hazards
    • All Types of Differences Tables
    • Parallel Processing
    • Addition/Subtraction Conversion
    • Data Representation
    • Page 1
Powered by GitBook
On this page
  • Topic 1: Business Objectives and Security Policy
  • Topic 2: Reviewing Previous Test Results
  • Topic 3: Business Challenges in Planning a Controlled Attack
  • Topic 4: Engagement Planning
  • Topic 5: Multi-Phased Attacks and Teaming Structure
  1. Ethical Hacking
  2. Ethical Hacking Syllabus

Unit II: The Business Perspective ( English )

Topic 1: Business Objectives and Security Policy

Definition: Business objectives define the goals an organization aims to achieve, while a security policy outlines the rules and procedures to protect its assets and data.

Subtopics:

  1. Business Objectives:

    • Goals such as increasing revenue, improving customer satisfaction, or expanding market share.

    • Security measures must align with these objectives to ensure business continuity.

    • Example: A bank’s objective to provide secure online banking aligns with its security policy to encrypt customer data.

  2. Security Policy:

    • A document that defines how an organization protects its physical and digital assets.

    • Includes rules for access control, data protection, incident response, and employee training.

    • Example: A company’s security policy may require two-factor authentication (2FA) for all employees accessing sensitive systems.

  3. Alignment of Security with Business Goals:

    • Security measures should support business objectives without hindering productivity.

    • Example: Implementing a secure payment gateway to protect customer transactions while ensuring a smooth checkout process.

Mind Map/Crux Line: Business Objectives → Security Policy → Access Control, Data Protection, Incident Response → Align Security with Business Goals.


Topic 2: Reviewing Previous Test Results

Definition: Analyzing the outcomes of past security tests to identify recurring vulnerabilities and improve future security measures.

Subtopics:

  1. Importance of Reviewing Test Results:

    • Helps identify patterns in vulnerabilities and areas needing improvement.

    • Ensures that past issues have been resolved and new risks are addressed.

    • Example: A company reviews its previous penetration test results to find that weak passwords were a recurring issue and implements stronger password policies.

  2. Steps to Review Test Results:

    • Analyze vulnerabilities identified in previous tests.

    • Verify if remediation efforts were effective.

    • Update security policies and procedures based on findings.

    • Example: After reviewing test results, a company discovers that outdated software was a common vulnerability and schedules regular patch updates.

  3. Tools for Reviewing Test Results:

    • Vulnerability Management Tools: Nessus, Qualys, OpenVAS.

    • Reporting Tools: Microsoft Excel, Tableau, or custom dashboards.

    • Example: Using Nessus to generate a report showing the status of previously identified vulnerabilities.

Mind Map/Crux Line: Review Test Results → Identify Patterns → Verify Remediation → Update Policies → Improve Security.


Topic 3: Business Challenges in Planning a Controlled Attack

Definition: Organizations face challenges when planning and executing controlled attacks (penetration tests) to assess their security posture.

Subtopics:

  1. Resource Constraints:

    • Limited budget, time, or skilled personnel can hinder the effectiveness of a penetration test.

    • Example: A small business may lack the budget to hire experienced ethical hackers for a comprehensive test.

  2. Scope Definition:

    • Defining the scope of the test can be challenging, as it must balance thoroughness with minimal disruption to business operations.

    • Example: A company struggles to decide whether to include its internal network in the test, fearing potential downtime.

  3. Legal and Compliance Issues:

    • Ensuring the test complies with laws and regulations (e.g., GDPR, HIPAA) is critical.

    • Example: A healthcare provider must ensure its penetration test does not violate patient privacy laws.

  4. Stakeholder Buy-In:

    • Gaining support from management and other stakeholders can be difficult, especially if they perceive the test as risky or unnecessary.

    • Example: A CEO may resist a penetration test due to concerns about potential disruptions to customer services.

Mind Map/Crux Line: Business Challenges → Resource Constraints, Scope Definition, Legal Issues, Stakeholder Buy-In → Plan Controlled Attack Effectively.


Topic 4: Engagement Planning

Definition: The process of organizing and scheduling a penetration test, including defining the attack type, source point, and required knowledge.

Subtopics:

  1. Time Management:

    • Allocating sufficient time for each phase of the test (reconnaissance, scanning, exploitation, etc.).

    • Example: A company allocates two weeks for a comprehensive penetration test, with specific deadlines for each phase.

  2. Attack Type:

    • Deciding whether the test will simulate an external attack, internal attack, or both.

    • Example: A bank conducts an external attack simulation to test its public-facing website and an internal attack simulation to assess employee access controls.

  3. Source Point:

    • Determining where the attack will originate (e.g., from the internet, a specific IP range, or within the organization).

    • Example: A company simulates an attack from a specific IP range to test its firewall rules.

  4. Required Knowledge:

    • Ensuring the ethical hacking team has the necessary skills and tools to conduct the test effectively.

    • Example: A team uses Metasploit for exploitation and Nessus for vulnerability scanning during the test.

Mind Map/Crux Line: Engagement Planning → Time Management, Attack Type, Source Point, Required Knowledge → Organize Penetration Test.


Topic 5: Multi-Phased Attacks and Teaming Structure

Definition: A multi-phased attack involves breaking the penetration test into stages, while the teaming structure defines the roles and responsibilities of the testers.

Subtopics:

  1. Multi-Phased Attacks:

    • Dividing the test into phases such as reconnaissance, scanning, exploitation, and reporting.

    • Example: A company conducts a reconnaissance phase to gather information, followed by a scanning phase to identify vulnerabilities.

  2. Teaming Structure:

    • Defining roles such as lead tester, network analyst, and report writer.

    • Example: A team includes a lead tester to oversee the test, a network analyst to perform scanning, and a report writer to document findings.

  3. Law Enforcement Involvement:

    • In some cases, law enforcement may be involved to ensure the test complies with legal requirements.

    • Example: A government agency conducts a penetration test with law enforcement oversight to ensure compliance with national security laws.

Mind Map/Crux Line: Multi-Phased Attacks → Recon, Scan, Exploit, Report → Teaming Structure → Roles, Responsibilities, Law Enforcement.


PreviousUnit I: Introduction ( Hinglish )NextUnit II: The Business Perspective ( Hinglish )

Last updated 4 months ago