2. Any attempt to intrude into a computer or a
network without authorization is called hacking.
This involves changing of system or security
features in a bid to accomplish a goal that differs
from the intended purpose of the system.
An individual who involves themselves in hacking
activities is known as a hacker, and some
companies employ hackers as part of their support
staff.
These kind of hackers use their skills to find flaws
in the company security system, to prevent
identity theft and other computer-related crimes
against the company.
3. The most common are white hats, black hats and grey
hats.
White hats hack to check their own security systems to
make it more hack-proof. In most cases, they are part of
the same organization.
Black hat hackers hack to take control over the system
for personal gains. They destroy, steal and even
prevent authorized users from accessing the system, by
finding loopholes and weaknesses in the system.
Grey hat hackers comprise curious people who have
just about enough computer language skills to enable
them to hack a system to locate potential loopholes in
the network security system. They then notify the
network system admin about the weaknesses
discovered in the system.
4. A cracker is someone who breaks into a
network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
Crackers also act as Black Hats: by gaining
access to the accounts of people maliciously
and misusing this information across networks.
They can steal credit card information, they can
destroy important files, disclose crucial data
and information or personal details and sell
them for personal gains.
5. The basic difference is that a hacker uses their
extensive knowledge of computer logic and
code, while a cracker looks for back doors in
programs, and exploits those back doors.
Hackers break into the security systems for the
sole purpose of checking the holes in the
system and works on rectifying these while as
the Cracker breaks into the security system for
criminal and illegal reasons or for personal
gains.
6. Malware is a program designed to gain access
to computer systems, normally for the benefit
of some third party, without the user’s
permission.
Malware includes computer viruses, worms,
Trojan horses, ransomware, spyware and other
malicious programs.
7. A Virus is a malicious executable code attached to
another executable file.
The virus spreads when an infected file is passed
from system to system. Viruses can be harmless or
they can modify or delete data.
Opening a file can trigger a virus. Once a program
virus is active, it will infect other programs on the
computer.
8. Worms replicate themselves on the system,
attaching themselves to different files and
looking for pathways between computers, such
as computer network that shares common file
storage areas.
Worms usually slow down networks. A virus
needs a host program to run but worms can
run by themselves.
After a worm affects a host, it is able to spread
very quickly over the network.
9. Its purpose is to steal private information from
a computer system for a third party.
Spyware collects information and sends it to
the hacker.
10. A Trojan horse is malware that carries out
malicious operations under the appearance of
a desired operation such as playing an online
game.
A Trojan horse varies from a virus because the
Trojan binds itself to non-executable files,
such as image files, audio files.
11. A logic bomb is a malicious program that uses a
trigger to activate the malicious code.
The logic bomb remains non-functioning until
that trigger event happens.
Once triggered, a logic bomb implements a
malicious code that causes harm to a computer.
Cybersecurity specialists recently discovered logic
bombs that attack and destroy the hardware
components in a workstation or server including
the cooling fans, hard drives, and power supplies.
The logic bomb overdrives these devices until they
overheat or fail.
12. Ransomware grasps a computer system or the
data it contains until the victim makes a
payment.
Ransomware encrypts data in the computer
with a key which is unknown to the user.
The user has to pay a ransom (price) to the
criminals to retrieve data.
Once the amount is paid the victim can resume
using his/her system.
13. A backdoor bypasses the usual authentication
used to access a system.
The purpose of the backdoor is to grant the
cyber criminals future access to the system
even if the organization fixes the original
vulnerability used to attack the system.
14. A rootkit modifies the OS to make a backdoor.
Attackers then use the backdoor to access the
computer distantly.
Most rootkits take advantage of software
vulnerabilities to modify system files.
15. Keylogger records everything the user types on
his/her computer system to obtain passwords
and other sensitive information and send them
to the source of the keylogging program.
16. Thank You
for any Queries contact on the given email id
zunnunkhan@gmail.com