Home » Cyber Security

Introduction to Cyber Security and Hacking World

Here, we are going to learn about the Cyber security, introduction to cyber security and hacking world and types of hackers.
Submitted by Anshuman Das, on July 10, 2019

At first, we need to understand what is "Cyber Security" means... Sometimes we also refer to it as "Information Technology Security". It is a technique of protecting our systems, networks, and programs from unauthorized access from Hackers.

Now the question is who are the Hackers?

cyber security 1

Hackers are those people who can access our private and personal data it may be legally or illegally.

Now the basis of these, there are three types of hacker are there. We'll discuss them one by one.

Types of hackers

1) Black Hat Hackers

Those who access our private data illegally by mean of harming someone, are known as Black Hat Hackers. They are very dangerous to our society and they work for only money.

cyber security 2

2) Grey Hat Hacker

Those who are aware of all knowledge of both the hacking legally or illegally. Sometimes they hack for some good reasons and sometimes they hack for fun(illegally), are known as Grey Hat Hacker.

cyber security 3

3) White Hat Hacker

Those who hack for only good reason and to make our society crime free and legally (with authorized permission), are known as White Hat Hacker.

cyber security 4

Hope you all understand types of hackers. Except these three there are some other types of people (who access unauthorizedly to other systems). Now we will discuss them.

a) Script Kiddie

Script Kiddie is one type of Hacker who have less knowledge of hacking. Rather he learns about the third-party hacking tools and uses them for hacking. Watches YouTube videos how to use them then hack it. This type of hackers usually performs DoSing (Denial of Services) and DDoSing (Distributed Denial of Services). They often copy others code to make the virus and then break into others system. Eventually, every Hacker is a Script Kiddie initial stage of hacking.

cyber security 5

b) Red Hat

Red Hat is the real vigilant of the Hacker world. They're like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer

cyber security 6

Now we will look into various terms and terminologies related to Hacking...

We've often heard a word: "VIRUS", let's know about what is VIRUS?

A computer virus is a malicious software program loaded onto a users computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though.

cyber security 7

It's one type of MALWARE.

Again, at this point, the question arises what is MALWARE?

Now the second common term that's used in Hacking field is MALWARE (comes from "Malicious" + "Software"). It is a software that's intentionally designed to cause damage to any client, server, computer networks, etc.

There is other Malware like Trojan, Worm, Ransomware, Spyware, etc.

Now we'll try to differentiate those ones by one.

Trojan

A trojan is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network.

cyber security 8

Worm

A worm is another type of Malware which can replicate itself, spread without end-user action and cause the victim system devastating damage.

cyber security 9

Ransomware

Ransomware is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid. Ransomware often infiltrates a PC as a computer worm or Trojan horse that takes advantage of open security vulnerabilities.

cyber security 10

Spyware

Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.

Example of a Spyware is KeyLogger.

cyber security 11

These were all the basic of terminologies in Cyber Security and Hacking World part which you must to know.

We'll be back again with another tutorial of Ethical Hacking. If you are a beginner practice more the Command Line interface of Kalil Linux. For more help please visit the "Linux" section of our website and "Computer Networks" (Mainly Subnetting, Topologies, etc. )






Comments and Discussions

Ad: Are you a blogger? Join our Blogging forum.




Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates


© https://www.includehelp.com some rights reserved.