Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Introduction to Hacking and their types

Author: Gautham Kumar
by Gautham Kumar
Posted: Jun 23, 2019
introduction to Hacking and their types There are so many definitions for "hacker." Ask this question from an expert and you’ll get a very new answer at each time. Because "many mouths will have more talks" and that is the reason behind the different definitions of hackers which in my opinion is quite justified for everyone has a right to think differently. Before the 1990s, the word "hacker" uses to describe a great programmer, someone who was able to create complex logic. Over the time the word has gained negative impact, and the media started referring to a hacker as someone who discovers new ways of hacking into a private system, be it a public computer system or a programmable logic controller, someone who is capable of hacking into government banks, stealing debit card information, etc. That is the picture that is created by the media and this is untrue because everything has a positive and a negative feature to it. What the media has been showing attention is only the negative aspect; the people that have been protecting organizations by responsibly disclosing quality are not being highlighted. However, if you notice at the media’s opinion of a hacker in the before the 1980s, you would find a very common characteristic, such as creativity, the ability to solve complex problems, and new ways of compromising targets. So, the term has been split down into three types: 1. White hat hacker— White hat hacker is often referred to as a security researcher or security professional. Such types of ethical hackers are employed by an organization and are permitted to attack an organization to find the quality that an attacker might be able to exploit. 2. Black hat hacker—They are called a cracker, this kind of hacker is referred to as a bad guy, who can use his or her knowledge for negative purposes. They are often referred to as hackers. 3. Gray hat hacker—This kind of hacker is an intermediate between a black hat and a white hat hacker. For instance, a gray hat hacker would work as a security professional for any company and will be responsible to disclose everything to them; however, she or he might leave a backdoor to access it later and might also sell the very confidential information, obtained after the compromise of a company’s target server, to competitors. you can learn in ethical hacking online course Important Terminologies Asset An asset is any device, data or another component of the environment that supports various information related activities that should be protected from anyone besides the people that are allowed to view or manipulate the data/information. you can also learn more in ethical hacking certification Vulnerability The vulnerability is defined as a weakness inside the asset which could be used to gain unauthorized access to it. The successful compromise of vulnerability may result in data manipulation. Threat Similarly, threat represents a danger to the computer system. It represents something that an organization doesn’t want to happen. The exploitation of the vulnerability is a threat. A threat may be a malicious hacker who is trying to get unauthorized access to an asset. Learn to hack in the ethical hacking online course
About the Author

We provide online training on various courses related to It technologies. if you are interested you can contact me

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Gautham Kumar

Gautham Kumar

Member since: Mar 12, 2019
Published articles: 19

Related Articles