Ethical hacking terminologies

Ethical Hacking Terminologies 

Following is the list of terms that are frequently used in the field of ethical hacking. If you are not aware of these terms then it would be difficult for you to understand the concept of ethical hacking properly. Thus knowing this will ease your process of going further in this domain.






Vulnerability - 

A weakness, flaw or loophole in a system, network or any device that can be exploited.

Threat - 

A danger that can exploit an existing bug or vulnerability to compromise the security of a network system.

Attack -

An action that is done to extract a sensitive data by getting unauthorized access of a system.






Phishing -

A process where an attacker creates fake website or url which looks like a legit page but it's to trap the user to get sensitive data.

Backdoor - 

A hidden entry point which can bypass the authentication process i.e logins and passwords also known as trapdoor.






Brute force attack -

Permutation and combinations that are used to get into the system which can be done either manually or using some automated tools. It tries different sets of usernames and passwords over and over again until the login is successful.

Denial of service attack -

A malicious attack to either temporarily suspend the service or making resources unavailable to the user also known as DOSing.

Distributed denial of service -

An attack where multiple systems target a server to disrupt the services running on the host machine, which makes the system slow and users won't be able to interact with it.






Firewall -

A network security device which monitors incoming and outgoing traffic and keeping unwanted intruders outside computer system for safe communication between users and system.

Malware -

A malicious software designed by hackers to hack a computer system and steal sensitive information. These goes by various names such as virus, worms, trojans, adware, spyware etc.






Spoofing -

A technique used by attackers to gain unauthorized access to computer, where intruder sends messages to a computer indicating that the message is coming from trusted host.



Learn : Phases of Ethical Hacking






Comments

Post a Comment

Popular

OSI model

Phases of ethical hacking