Some Common Terms in cyber world:
1.Hacking:
Hacking recognizes weaknesses in PC frameworks or
systems to misuse its weaknesses to obtain entrance.
Example of Hacking: Using password cracking algorithm to
gain access to a system.
A Hacker is a person who finds and exploits the weakness in
computer systems and/or networks to gain access.
The following list classified hackers according to
their intent:
1._Ethical Hacker (White hat): A hacker who
gains access to systems with a view to fix the identified weaknesses. They may
also perform penetration testing and vulnerability assessments.
2._Cracker (Black hat): A hacker who gains
unauthorized access to computer systems for personal gain. The intent is
usually to steal corporate data, violate privacy rights, transfer funds from
bank accounts etc.
3._Grey hat: A hacker who is in between
ethical and black hat hackers. He/she breaks into computer systems without
authority with a view to identify weaknesses and reveal them to the system
owner
4._Script kiddies: A non-skilled person who
gains access to computer systems using already made tools.
5._Hacktivist: A hacker who use hacking to
send social, religious, and political, etc. messages. This is usually done by
hijacking websites and leaving the message on the hijacked website.
6._Phreaker: A hacker who identifies and
exploits weaknesses in telephones instead of computers.
2.Trojan Horse:
A Trojan horse or Trojan is a sort of malware that is
regularly disguised as genuine programming.
Trojans can be utilized by digital hoodlums
and programmers attempting to access clients' systems who are normally
deceived by some type of social engineering into stacking and executing Trojans
on their systems.
Once activated, Trojans can empower digital crooks to keep an
eye on you, take your sensitive information, and pick up secondary passage
access to your system.
These actions can include:
· * Deleting
data
* Blocking
data
* Modifying
data
* Copying
data
* Disrupting
the performance of computers or computer networks.
Trojans
are not able to self-replicate.
3.Phishing:
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details,often for malicious reasons.
It is carried out by email spoofing or
instant messaging. It often directs users to enter personal information
at a fake website, the look & feel of which are identical to the legitimate one and the
only difference is the URL of the website in concern.
Phishing is an example of social engineering techniques used to deceive users, and exploits
weaknesses in current web security.
4.Spyware:
Spyware is software that aims to gather information about a
person or organization without their knowledge, that may send such information
to another entity without the consumer's consent.
"Spyware" is
mostly classified into four types: adware, system monitors,
tracking cookies, and Trojans
Example-keyloggers,rootkits etc.
Spamming: It is
the electronic messaging systems to send an unsolicited message (spam), especially
advertising, as well as sending messages repeatedly on the same site.
website: https://www.ica.in/
email: cyberarmy@ica.in
Helpline No: 9968600000


Comments
Post a Comment