0% found this document useful (0 votes)
29 views8 pages

Introduction To Cyber Security

Uploaded by

Syed Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views8 pages

Introduction To Cyber Security

Uploaded by

Syed Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Introduction to

CyberSecurity
What is Cyber Security

Cybersecurity is the protection of internet-connected


systems such as hardware, software and data from
cyberthreats. The practice is used by individuals and
enterprises to protect against unauthorized access to
data centers and other computerized systems.
What is Hacking?

Hacking is the act of identifying and then exploiting


weaknesses in a computer system or network, usually
to gain unauthorized access to personal or
organizational data. Hacking is not always a malicious
activity, but the term has mostly negative connections
due to its association with cybercrime.
What is Ethical Hacking?

Ethical hacking is to scan vulnerabilities and to


find potential threats on a computer or networks.
An ethical hacker finds the weak points or
loopholes in a computer, web applications or
network and reports them to the organization.
Types of Hackers

White Hat Gray Hat


Here, we look for bugs and ethically report it
Black Hat They sometimes access to the data and
to the organization. We are authorized as a violates the law. But never have the same
user to test for bugs in a website or network Black Hat hackers are criminals
intention as Black hat hackers, they often
who break into computer networks
and report it to them. White hat hackers operate for the common good. The main
with malicious intent. They may
generally get all the needed information difference is that they exploit vulnerability
also release malware that destroys
about the application or network to test for, publicly whereas white hat hackers do it
files, holds computers hostage, or
from the organization itself. They use their privately for the company.
steals passwords, credit card
skills to test it before the website goes live or
numbers, and other personal
attacked by malicious hackers.
information.
What is Vulnerability?
A vulnerability is a weakness or error in a system or device’s code that, when exploited, can compromise the
confidentiality, availability, and integrity of data stored in them through unauthorized access, elevation of
privileges, or denial of service.

What is zero-day Vulnerability?


A zero-day vulnerability is a vulnerability in a system or device that has been disclosed but is not yet patched.

What is Exploit?
An exploit is a program, or piece of code, designed to find and take advantage of a security flaw or
vulnerability in an application or computer system, typically for malicious purposes such as installing
malware. An exploit is not malware itself, but rather it is a method used by cybercriminals to deliver malware.

What is zero-day Exploit?


A zero-day exploitis the method hackers use to attack systems with a previously identified
vulnerability.
What is Backdoor?
IA Backdoor Attack is an attempt to bypass system or network security by maliciously taking
advantage of software's weak point.

What is Payload?

A payload is malware that the threat actor intends to deliver to the victim.

Five phase of Ethical Hacking


The Reconnaissance Phase.
The Scanning Phase.
The Gaining Access Phase.
The Maintaining Access Phase.
The Covering of Tracks Phase.

You might also like