Ethical Hacking

ETHICAL HACKING PART II

0  0 2016-02-20 10:14:14

..Continued from Ethical hacking 

To know deep about hacking and computer system security there are some terminologies used in this field which are as follows.

Every terminology differs in their purpose of actions.

1.) Neophyte:
          Neophyte is someone who new to hacking or cracking and has almost no knowledge and experience of working with technology and hacking concepts.

2.) Script Kiddies:
           Script kiddies refer to person who not necessarily understand the tools and the logic being used, who likes to build graffiti. The primary goal in this is defacement, not theft or information gathering. Since someone does not understand the logic used for tool does not make him or her any less dangerous.

3.) Blue Hat:
           A blue hat hacker uses to bug-test a system prior to its launch, looking for exploits so they can be figure out, outside computer security consulting firms

4.) Hacktivist:
           A hacktivist is a hacker who utilizes technology to publish a social, ideological, religious or political message. Most hacktivism includes website defacement or denial-of-service (also known as DoS) attacks.

5.) White Hat:
           A white hat hacker breaks security for sole and legal reasons, perhaps to test their own system security or while working for a security company which makes security software and tools for the same. The term "white hat" refers to an ethical hacker in Internet slang. This classification includes computer expert who perform penetration tests, vulnerability and system security analysis within a contractual agreement. The EC-Council (known as the International Council of Electronic Commerce Consultants) is one of the organizations that have developed certifications, courseware and online training covering the diverse area of Ethical Hacking

6.) Black Hat:
           A black hat hacker is who violates computer security for little reason beyond malicious activity or for personal gain. Black hat hackers break into secure systems, mostly networks to destroy data or to make the network unusable for those who have authorities to use the network. Black hat hackers are also referred as the "crackers" in security industry and by modern programmers. Crackers keep the awareness of the patches to themselves and do not notify the general public or manufacturer about patches and vulnerability to be applied. Once they gain control over a system, they may apply patches or fix the system vulnerabilities only to keep their reigning control.

7.) Grey Hat:
           A grey hat hacker is a mixture/compound of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack computer system for the sole purpose of notifying that their system has a security defect to administrators.                                    

Comments (0)

Post Your Comments

Headquarter



Hong Kong Office



Find Us On

Website Development Company
SEO
Digital Marketing
website development company in Hong Kong
website designer in pune