The CIA triad consists of:
- Confidentiality: Measures taken to prevent disclosure of information to unauthorized individuals or systems
- Integrity: Methods to protect information from unauthorized alteration, ensuring data arrives unchanged
- Availability: Ensuring communications systems and data are ready for use when legitimate users need them
This triangle represents a fundamental security principle: as security increases, functionality and ease of use decrease. Organizations must balance these three elements - making a system more secure typically makes it less functional and harder to use.
- Ethical Hacker: Works with explicit written permission and approval from a customer to improve security
- Cracker (Malicious Hacker): Uses skills for personal gain or destructive purposes without permission and outside the interest of the system owner
- White Hats: Ethical hackers hired to test and improve security with permission
- Black Hats: Crackers who illegally use skills for personal gain or malicious intent
- Gray Hats: Neither good nor bad - curious about techniques or believe it's their duty to demonstrate flaws, but work without explicit permission
- Reconnaissance: Gathering information about targets (passive and active)
- Scanning and Enumeration: Actively applying tools to gather in-depth information
- Gaining Access: Launching actual attacks against enumerated targets
- Maintaining Access: Ensuring continued access through backdoors, trojans, etc.
- Covering Tracks: Concealing success and avoiding detection
- Preparation: Contract negotiation, scope definition, team assignment
- Assessment (Security Evaluation): Actual security control testing
- Conclusion (Post-Assessment): Final report preparation with findings and recommendations
| Testing Type | Knowledge Level | Simulates |
|---|---|---|
| Black Box | No knowledge of target system | External unknown attacker |
| White Box | Full knowledge of network/system infrastructure | Knowledgeable internal threat |
| Gray Box | Limited knowledge | Privilege escalation from trusted employee |