Ethical Hacking For Beginners (Chapter-2)

cyber security


In this Chapter of the Ethical Hacking for Beginners series, we are going
to learn some of the most used Ethical Hacking Terminologies.
Which you'll need to understand how ethical hacking works.

Some Ethical Hacking Terminologies:-


  • Adware:- A piece of code/ Software/ script used to show forcefully ads by getting into your system/ browser without your permission.

  • Attack:- An action performed to get into your system forcefully without your permission.


  • Backdoor:- Basically a method of bypassing authentication in a computer/ system/network. Used by Trojan mainly for obtaining remote access to your system. And spying upon you.


  • Breach:- When a hacker successfully exploits a system and gains access to that system or its files or network and most of the cases leak sensitive data or sells them.


  • Bugs:- A vulnerability/ weakness in a system/ software/ network/ device. Which was made by developers unintentionally or by mistake.


  • Bot:- Short form of robot. Basically, an automated program is used to perform the same task repeatedly for a huge number of time. Like trying different passwords in a login form to get access, where there is no human interaction. The whole script is being run by that bot.


  • Buffer Overflow:- A flaw in a program that leads to overflow in a memory block (called buffer memory) by entering data more than the capacity of that memory block and making other data overwritten by that newly entered data and in most of the cases gaining access to that system.


  • Deep Fake:- And edited audio or video clip manipulated to seem real or believable. Mostly created/ edited using softwares.


  • Encryption:- Process of encoding data to prevent data theft. Only decoded by a virtual key(secret set of data(string))


  • Exploit:- A piece of code/ script/ software used to take advantage of a bug or may be to compromise the security of a computer system.


  • Pentesting:- Short of Penetration Testing. means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.


  • Quarantine:- The process of isolating a file suspected of being infected with a virus in a storage device in order to prevent it from contaminating other files or other drives. Antivirus uses this feature to prevent virus infection in a system.


  • Spam:- An unsolicited email/ junk email sent to a group of recipients without their consent. Mostly for advertising or hacking(phishing) purposes.


  • Threat:- Possible danger which can compromise a system/ network using a vulnerability/ exploit.

  • Vulnerability:- A weakness in a system/ program/ network by using which a hacker can gain access in that system and compromise that system.


These are some of the most important terminologies for ethical hacking.
There are so many others also. Will discuss and introduce those later
during the tutorial.

0 Comments:

Post a Comment

Contact

Contact Me

I am open to hire. If you like my work, feel free to contact me. And also if you have any query, suggestions or complaint you can contact me too. Just fill up the form or DM me, and i'll get back to you asap.

Work Time:

Monday - Sunday from 11am to 11pm