A Guide to Security Lingo

A Guide to Security Lingo


In our modern world where, in some way or the other, most of everything is networked, security has become a major global concern and needs to be addressed as soon as possible. With the increase in people digitally managing their lives, it is very important for anyone who belongs to any filed to know the basics to be safe from any financial, personal or data loss.

So Prevention Is Better Than Cure

A few question marks: –

What is Hacking?

Hacking is the process of finding system / network / site vulnerabilities and manipulating those weaknesses in an attempt to access them. Simply put, for some criminal reason, it is the unauthorized access or control of computer network security systems.

Who is a Hacker?

A hacker is a person who tries to gain access by discovering and exploiting the weaknesses / loopholes in a system / network.

Now they are generally classified into 3 groups of short hackers:

  • Black Hat Hackers: A hacker who for unethical purposes gains unauthorized access to a system.
  • White Hat Hackers: A hacker who achieves unauthorized access to a network to disclose and fix this vulnerability before it could be exploited by a black hat hacker.
  • Grey Hat Hackers: A hacker who may break ethical standards and laws at times, but as a black hat hacker has no malicious purpose.

Now let’s take an example of real life that most of us know:

Today we live in a world where messages from WhatsApp are flying faster than light speed. All of us must have encountered a lot of messages like free Jet airways tickets, free DMart shopping, 1099 MI phone, etc. and most of us fall into this trap. But these are nothing but scams that are innocent. In hacking terminology, these are referred to as phishing strategies where the malicious hacker creates web pages that appear identical to the original website in an attempt to steal information from the user for their own needs.

Who am I?

Okay, I’m a technology enthusiast (hoping to become a specialist one day) who spends most of his time studying and reading practically everything relevant to cyber security and practicing different security tools and techniques (for ethical reasons, of course)

What to expect ?

Because we are all learners, no matter how smart you are, we still continue to learn something or the other on a regular basis as learning has no age. Therefore, the main purpose of this blog would be to share information. I’ll be coming up with interesting articles on ethical hacking techniques, different attacking vectors and security issues for everyone with proper explanation and procedures. If you want, you can also ping me on topics you would like me to post on. So eventually, like all of us mistakes, when I write something wrong, you are gladly encouraged to correct me (I swear I won’t let that happen).

So that’s for now. See you next time.



Solutions

Solutions

Services

Services