PREVFinLit1 - IG (80p Protected Preview)

COPYRIGHTED MATERIAL

EXPLORING 21st CENTURY SKILLS AND ISSUES

Refer to www.eccouncil.org/Certification to answer the questions 3-8. 3. What (or who) is an ethical hacker ?

A trusted employee of an organization who attempts to penetrate networks and/ or computer systems using the same methods and techniques as a hacker. The point is to find weaknesses in the company’s own security. _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ 4. Can you earn a certificate in ethical hacking? _ ______________________________________________________________________________ _ ______________________________________________________________________________ 5. What does CHFI stand for? What does a CHFI do? What are their skills? _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ 6. What (or who) is a CHI and what do they do? _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ 7. What is steganography? _ ______________________________________________________________________________ 8. What (or who) is a CES, and what do they do? _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ The art of concealing a message – also known as cryptography. Certified Incident Handler. They handle and respond to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. Certified Encryption Specialist. Someone who has been trained in cryptography. They know how to encrypt a drive , methods for decoding messages, and have knowledge of code algorithms. Computer Hacking Forensic Investigator; a CHFI investigates cyber crime , collects digital evidence , recovers deleted files, cracks passwords, evaluates an electronic crime scene , tracks email crimes, decodes hidden e-messages; they also know how to obtain a search warrant for electronic evidence . PRODUCT PREVIEW Yes, you can become a CEH (Certified Ethical Hacker) through EC-Council training.

47

THE 21st CENTURY STUDENT’S GUIDE TO FINANCIAL LITERACY

Made with FlippingBook flipbook maker