6. Number of breaches per threat actor category over time
Number of breaches per threat action category over time
Percent of breaches per threat actor motive over
time
9. Hacking vs Ethical Hacking
• Exploiting system vulnerabilities to gain unauthorized access
• Modifiying system or application feature
• Identifiying vulnerabilities to ensure system security
• Simmulating techniques to veirify vulnerabilities
10. Ethical Hacking answers following questions
• What can intruder see?
• What can intruder do?
• Does anyone notice intruders’ attempts?
• All components are adequately protected?
• Does the information security measures are in compliance?