Chapter 1

Introduction to Vulnerability and Penetration Testing

IN THIS CHAPTER

Bullet Understanding hackers’ and malicious users’ objectives

Bullet Examining how the security testing process came about

Bullet Recognizing what endangers your computer systems

Bullet Starting to use the process for security testing

This book is about testing your computers and networks for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them.

Straightening Out the Terminology

Everyone has heard of hackers and malicious users. Many people have even suffered the consequences of their criminal actions. Who are these people, and why do you need to know about them? The next few sections give you the lowdown on these attackers.

Remember In this book, I use the following terminology:

  • Hackers (or external attackers) try to compromise computers, sensitive information, and even entire networks for ill-gotten gains — usually from the outside — as unauthorized users. Hackers go for almost any ...

Get Hacking For Dummies, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.