Welcome to YLOAN.COM
yloan.com » College-University » Learn Ethical Hacking
College-University Vocational-Trade-Schools Root Category Home-Schooling scholarships books certification students

Learn Ethical Hacking

Introduction

Introduction

A Web Server is a computer configured and connected to Internet, for serving web pages to people when the require them. Information on Public web servers can be accessed by people anywhere on the world. Since web servers are open to public access they can be compromised by hackers for malicious things

What a hacker can do ?

1)Hackers can deface websites

2)Hackers can steal valuable data from systems.

3)Hackers can use that data for its malicious purpose.

4)Hackers can give you a significant loss of revenue if you have a ecommerse site.

5)In the case of corporate and government systems, loss of important data may actually mean the launch of information espionage or information warfare on their sites.

6)Hackers can cause significantly damage to the image of a organisation

Common security threats to a public web server can be as the following-

----------Unauthorized access

----------Defacement

----------Content theft

----------Data manipulation(Injections flaws)

----------Improper usage of code(Code disclosure)

----------Improper Web Hosting(web server vulnerability)

----------Malicious contents (e.g.phising,trojan affected program)

----------Denial of Service(DOS/DDOS)

----------Physical Threats(physical stealing and damage)

Hackers take advantage of different security flaws in a web hosting infrastructure and exploit the vulnerability to compromise the system. Common security flaws that can lead to acompromise can be categorized as

----------Insufficient network boundary security controls

----------Flaws or bugs in web hosting software (OS, application etc)

----------Insecure design and coding of hosted application

----------Weak password

----------Social engineering

An attacker can adopt various hacking techniques or tools to exploit or take advantage of the above mentioned security flaws. A discussion on common hacking/attack methods.

bytec0de.com

mohit Yadav - 9891773445

Pradeep - 9210001115

by: Byte Code Securities
Learn How to Print Screen on a Mac in the Easy Way? The Amateur Most Excellent Directives In Studying Along With Participating Innumerable Two-player Ga Opting For A Daycare Learning Center With Voluntary Pre Kindergarten Or Vpk In Carrollwood, Tampa College Budgets and the State of the College Athletic Scholarship What You Can Learn From Search Results College Flags: Ideal For Collecting Golf Rangefinder Checklist - Learn What You Need Want To Know Why Traffic Falls? Read More And Learn Distance Learning: Implementing The Newest Technologies 5 Secrets on Learning How To Throw the Shuriken! Untimely Ejaculation Cure - My Leading several Advised Methods to Cure This Horrible Issue - Need to Study! College Photos: Get Familiar With Your Prospective Colleges College Rankings: Reflecting The True Worth Of Colleges
print
www.yloan.com guest:  register | login | search IP(216.73.216.26) California / Anaheim Processed in 0.017798 second(s), 5 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 59 , 2257, 249,
Learn Ethical Hacking Anaheim