What is Hacking :- Hacking is a
process to find out or identifying weakness in our Computer and Networks System.
Who is Hacker :- A person who
enjoy modifying system function. Hacker have excellent knowledge about Computer
and Network whole system Architecture. Hacker better know that how to computer
system and computer network work.
Type of Hacker
# White Hat :- These call
also a Ethical Hacker they find out the weakness in Computer or Network Systems
and they can also fix it.Some Organization give permission to White Hat Hacker
to find out the weakness in there Computer or Network Systems.
# Black Hat :- They can gain
unauthorized access to computer or network systems for personal gain. They
steal many type information like login password, bank account details etc. They
also known as Cracker.
# Grey Hat :- They work
like White Hat Hacker but some time they steal information for personal gain
just like Black Hat Hacker.
# Script kiddies :- A non-skilled
person who gains access to Network and Computer Systems using already made
tools. They have basic knowledge about Computer or Network Systems.
# Phreak :- They are find out weakness in
telephones.
What is Ethical Hacking
Some Organization beak there own Computer and Network
Systemsthey are find out the weakness in there Netwock or Computer Systems.
Ethical Hacker have full Permission (authorize) for the Hacking in there Organization.
Type Of Hacking Attack
# Passive Attack:- This type of
attack difficult to detect and it is a dangerous type of attack but they can be
prevented.
# Active Attack:- Active Attack
are difficult to prevent because they require protection of all communication
facilities and paths at all times.
What is Cyber Crime
Cyber-Crime is the use of computers to perform
illegal activities such as stealing companies data, stealing user name or
password, bank account, ATM number or passwords etc.
Type of Cyber Crime
1. Scams.
2. Identity Theft.
3. Remote Administration Tools.
4. Social Engineering.
5. E-Mail Bombing.
6. Virus Attacks.
7. Software Piracy.
8. Cyber Stalking.
How you liked this article please tell us your thoughts on comment box.
No comments:
Post a Comment