Cyber Security And Ethical Hacking With Ujjwal

 



INTRO TO CYBER SECURITY

In today's world, the Internet has become a basic necessity of one's existence, with a

increase in the daily popularity of the Internet resulting in an increase in online attacks, which

they have become quite prominent and are mainly addressed by those working in the government or

organization of service providers.

Unfortunately, these are regular web-related attacks, as well as possible threats

encountered when installing some web-based apps, it is quite challenging.

Computer security, cybersecurity, or information technology security is the protection of computer

 systems and networks from information disclosure, theft of, or damage to their hardware, software, or

 electronic data, as well as from the disruption or misdirection of the services they provide.

What is Cyber Security?

Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.

It aims to reduce the risk of cyber attacks and protect against the unathorised exploitation of systems, networks, and technologies.


What is Ethical Hacking?

Ethical hacking is an authorized practice of detecting vulnerabilities in an application, system, or organization’s infrastructure and bypassing system security to identify potential data breaches and threats in a network. 

Ethical hackers aim to investigate the system or network for weak points that malicious hackers can exploit or destroy. 

They can improve the security footprint to withstand attacks better or divert them.


TYPES OF HACKER



1. WHITE HAT HACKER

The person who have the ability to gain access over the system in a legal way is called as white hat hacker.

Authorized 

They wow under the permission given by goverment aurthorised company. 

They only provide security. 

They are also called as "ETHICAL HACKER"



2. BLACK HAT HACKER

The person who try to gain access over the system with illegal activities like cyber fraud, cyber crime is called as black hat hacker. 

They never follow the gov. Policy and rules to give security, they always harm others by doing illegal activities.



3. GREY HAT HACKER

Gray hat hackers don't necessarily want to cause pain or steal from their victims, but they often hack into their targets' networks to look for vulnerabilities in a system without the owners' permission or knowledge. 
Gray hat hackers will report the vulnerabilities to the owner, but they often request a fee to fix the issues they find.

4.SUCIDE HACKER

 The person who don't have any knowledge about hacking and they do their hacking activities with the help of readymade tools or script is called as script kiddie they are unaware about the negative outcomes of their illegal work.

 The person who can bypass the security layer of certain programe with the help of programming and coding skill is called as coder/ cracker.

 




Comments