Basic Terms And Definition Of Cyber Security You Must Keep In Mind Like Hacking, Hacker and its Types, Victim, Penetration Testing

  

These are the some basic terms of that you must keep in mind before starting.

Don’t use any information for wrong purposes. We will not be responsible

CYBER SECURITY:

The branch of computer science in which we study how to prevent the devices from black hat hackers, malwares attacks and other cyber-attacks, increase the devices security and make sure that our devices are fully secured from any attack.

CYBER ATTACK:

The attack involving the use of computer or computer based devices in any way is called Cyber Attack. For Example, Phishing Attack by using fake Login link.

HACKING:

 Finding weakness in a system, device or website and accessing this system using this weakness for bad purposes or security purposes is called hacking.

ETHICAL HACKING:

Hacking that is performed on a device, system or website after the permission of its owner to check and enhance the security is called ethical hacking.

BLACK HAT HACKING:

It is also known as unethical or non-ethical hacking that is performed on a device, system or website without the permission of owner, for wrong purposes like to blackmail or to breach or leak the data or to make money. Never even try it.

PENETRATION TESTING:

Applying hacking on a system, device or website to check its security is called penetration testing. It is always applied after the permission of owner.

VICTIM:

A person whose system, device or website is hacked or tested for security by the hacker is called victim.

HACKER:

A technically skilled person that is expert in finding the weakness in a system, devices or website to check security and can access the system is called hacker.

BLACK HAT HACKER:

 Black hat hacker is a money mind person that uses his/her hacking knowledge to make money by breaching others data or by blackmailing.

WHITE HAT HACKER:

 He uses his hacking knowledge to enhance the security of devices, systems and websites to save them from black hat hackers.

GRAY HAT HACKER:

 He is a mixture of White Hat as well as Black Hat hacker who can work as both depends upon condition.

Post a Comment

Previous Post Next Post