Skip to main content

'Cyber World' - Common Attacks

Some Common Terms in cyber world:




1.Hacking:

Hacking recognizes weaknesses in PC frameworks or systems to misuse its weaknesses to obtain entrance.

Example of Hacking: Using password cracking algorithm to gain access to a system.

A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access.


The following list classified hackers according to their intent:

1._Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.

2._Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.

3._Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner

4._Script kiddies: A non-skilled person who gains access to computer systems using already made tools.

5._Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

6._Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.



2.Trojan Horse:

A Trojan horse or Trojan is a sort of malware that is regularly disguised as genuine programming. 

Trojans can be utilized by digital hoodlums and programmers attempting to access clients' systems who are normally deceived by some type of social engineering into stacking and executing Trojans on their systems. 

Once activated, Trojans can empower digital crooks to keep an eye on you, take your sensitive information, and pick up secondary passage access to your system.

These actions can include:

·                            Deleting data
         
               * Blocking data
          
               * Modifying data
          
               * Copying data 
               
               * Disrupting the performance of computers or computer networks.
 
Trojans are not able to self-replicate.


3.Phishing:

 Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details,often for malicious reasons.

 It is carried out by email spoofing or instant messaging.  It often directs users to enter personal information at a fake website, the look & feel of which are identical to the legitimate one and the only difference is the URL of the website in concern.

Phishing is an example of social engineering techniques used to deceive users, and exploits weaknesses in current web security.



4.Spyware: 

Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent.

"Spyware" is mostly classified into four types: adware, system monitors, tracking cookies, and Trojans

Example-keyloggers,rootkits etc.

Spamming:  It is the electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site. 


                                                  


                                                      website: https://www.ica.in/
                                                email: cyberarmy@ica.in
                                                Helpline No: 9968600000

Comments

Popular posts from this blog

cybercrime case studies #1

FACEBOOK FAKE PROFILE CASES Facebook.com is a very popular online community and social networking website. Facebook users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Facebook members are publicly viewable. THE SCENARIOS ·           A   fake profile of a woman is created  on Facebook. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of “loose character” who wants to have sexual relations with anyone. Other Facebook members see this profile and start calling her at all hours of the day asking for sexual favors. This leads to a lot of harassment for the victim and also defames her in society. ·     ...

India’s Perspective: Need of Ethical Hacker’s in India

The word hacker has always been associated with a negative meaning.  In actual “hacker’' is someone who can build stuff and solve real-life problems.   It’s essential to get highlighted with difference between a hacker and a cracke r ; a cracker is someone who is adept in security breaking whereas a hacker is someone expert in preventing such incidents. With the rapid spread out of cyber-crime it has become difficult for companies to protect their critical data and security systems from the external threats coming in from the web. These companies are unaware to cope with this crime or don’t have a cyber-incident response plan ready with them. Companies and start-up ventures in India are not exposed or rather vulnerable to cyber-attacks or crimes. They must be aware and need strong security measures to safeguard their business with safety plug-ins. ETHICAL HACKING An ethical hacking has becoming a valued skill in India.... For more click here.. ...

Shop Safely in this FestiveSeason

Online shopping: It is also known as e-shopping in which the purchases made online either by computers or SmartPhones. You can shop online with or without full authentication . E-shopping or online shopping or e-store are all virtual types of stores which allow customers to buy products or services over the internet. It is convenient for the people to shop online without spending their valuable time in markets. But There is risk in ordering things online as Information about user’s activity on the Web is being recorded and there will be privacy losses. Many users are not aware about it. Web users leave a “data shadow” with information about what they read, where they shop, what they buy, whom they correspond with and so on. Mantras to shop online safely: Before Placing An Order Carefully read the terms and conditions, including the small print. These terms and conditions should be available on the merchant’s website. Check t...