Chapter 1

Introduction to Vulnerability and Penetration Testing

IN THIS CHAPTER

check Understanding hackers’ and malicious users’ objectives

check Examining how the security testing process came about

check Recognizing what endangers your computer systems

check Starting to use the process for security testing

This book is about testing your computers and networks for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them.

Straightening Out the Terminology

Everyone has heard of hackers and malicious users. Many people have even suffered the consequences of their criminal actions. Who are these people and why do you need to know about them? The next few sections give you the lowdown on these attackers.

remember In this book, I use the following terminology:

  • Hackers (or external attackers) try to compromise computers, sensitive information, and even entire networks for ill-gotten gains — usually from the outside — as unauthorized users. Hackers go for ...

Get Hacking For Dummies, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.