Cyber Security And Ethical Hacking With Ujjwal
In today's world, the Internet has become a basic necessity of one's existence, with a
increase in the daily popularity of the Internet resulting in an increase in online attacks, which
they have become quite prominent and are mainly addressed by those working in the government or
organization of service providers.
Unfortunately, these are regular web-related attacks, as well as possible threats
encountered when installing some web-based apps, it is quite challenging.
Computer security, cybersecurity, or information technology security is the protection of computer
systems and networks from information disclosure, theft of, or damage to their hardware, software, or
electronic data, as well as from the disruption or misdirection of the services they provide.
What is Cyber Security?
Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
It aims to reduce the risk of cyber attacks and protect against the unathorised exploitation of systems, networks, and technologies.
What is Ethical Hacking?
Ethical hacking is an authorized practice of detecting vulnerabilities in an application, system, or organization’s infrastructure and bypassing system security to identify potential data breaches and threats in a network.
Ethical hackers aim to investigate the system or network for weak points that malicious hackers can exploit or destroy.
They can improve the security footprint to withstand attacks better or divert them.
TYPES OF HACKER
1. WHITE HAT HACKER
The person who have the ability to gain access over the system in a legal way is called as white hat hacker.
Authorized
They wow under the permission given by goverment aurthorised company.
They only provide security.
They are also called as "ETHICAL HACKER"
2. BLACK HAT HACKER
The person who try to gain access over the system with illegal activities like cyber fraud, cyber crime is called as black hat hacker.
They never follow the gov. Policy and rules to give
security, they always harm others by doing illegal activities.
3. GREY HAT HACKER
4.SUCIDE HACKER
The person who can bypass the security layer of certain programe with the help of programming and coding skill is called as coder/ cracker.
Comments
Post a Comment