Computer Security, Forensics and Ethical Hacking
Learning Activity 1: Hackers and Hacking Process
- List the three classes of hackers.
- Describe the methodology employed during the hacking process.
- Propose a tool used to find vulnerabilities in web applications.
- Which type of hacker hacks government agencies to obtain confidential information?
- Explain the security vulnerabilities which a hacker can exploit from an operating system?
Work out the above in a word document and upload on the platform.
Social networks