Cybersecurity and the activities of computer hackers are very much in the news these days.:key:
But do you know your Black hat from your Grey hat? And what about White hats?
Here is a list of some common terms used to describe hackers and their activities - particularly useful for those attending the cyber security session at the ICAS Conference:
Black hat
Someone who carries out hacking for illegal purposes, usually for financial gain. They break into secure networks to destroy, ransom, modify or steal data, or to make the network unusable for authorised users. The name comes from the fact that the villains in old silent black and white western films were easily identified by cinema viewers because they wore black Stetsons whilst the “good guys” wore white hats.
Back door
A hidden “conduit” into a computer system that bypasses the orthodox protection of logins and passwords, thus making them basically ineffective in protecting data.
Brute force attack
A highly intensive, automated search by a hacker for every possible password to a system so as to breach security and gain access to a computer.
Doxing
Discovering and then publishing the identity of an internet user by following their details online.
Grey hat
Someone who carries out hacking, but not for personal or financial gain. An example would be hacking, carried out as part of a wider political protest by activists to embarrass or shame an organisation whose policies, or official views they regard as anathema.
IP
Internet protocol address – a computer’s identifier or “fingerprint”. This is used to identify the person using the device, track its activity or to reveal its location.
Keystroke logging
Tracking which keys are pressed by the user of a computer so that the hacker can then record login codes and passwords to the system.
Malware
A program designed to seize control over or steal data from a computer.
Phishing
Duping someone into giving you their personal information, such as passwords, bank account details (such as PIN numbers) and credit card details by sending them emails which appear to come from bona fide people or organisations.
Spoofing
Altering a genuine email so that it now appears to come from somewhere else, such as from your bank and giving spurious instructions which, if followed, will imperil the security of your data.
Spyware
This is “malware” programmed to sit unnoticed on a computer and send back data surreptitiously to the hacker.
Trojan Horse
Malware disguised as a “benign” and useful piece of software, but instead installs a “back door” in your computer which then allows a hacker unlimited access to your machine.
Virus
Self-replicating “malware” that injects copies of itself onto your computer. It can then cause catastrophic damage such as destroying a hard drive but can also steal information and log keystrokes.
Whaling
Phishing that targets the senior echelons of management of an organisation by a hacker in pursuit of financial gain or greater exposure for a political cause. Whaling could be used to collect sensitive or deeply embarrassing information about an individual e.g. salary, bonuses, private address, email and telephone numbers.
White hat
A hacker who uses their skills for social good, or helps organisations by exposing vulnerabilities in their IT systems. This is the opposite of a black hat.
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://www.icas.com/technical-resources/15-common-computer-hacker-terms
Welcome to Steemit, kenfolios! Best wishes for a very enriching experience here in this very cool community with many nice people :) Life is beautiful
By the way, there are several groups you as a newcomer can join. They will stay with you for your journey, helping and mentoring along the way.
@greetersguild invite link https://discord.gg/AkzNSKx
@newbieresteemday invite link https://discord.gg/2ZcAxsU
Welcome to Steem, @kenfolios!
I am a bot coded by the SteemPlus team to help you make the best of your experience on the Steem Blockchain!
SteemPlus is a Chrome, Opera and Firefox extension that adds tons of features on Steemit.
It helps you see the real value of your account, who mentionned you, the value of the votes received, a filtered and sorted feed and much more! All of this in a fast and secure way.
To see why 2931 Steemians use SteemPlus, install our extension, read the documentation or the latest release : SteemPlus 2.17 : Tips.
Hello @kenfolios!
I noticed you have posted many times since you began your journey on Steemit. That is great! We love active partipants.
I do want to point out that the Introduceyourself tag is meant to be used once only to introduce yourself to the Steemit community. You have now posted 5 times using the introduceyourself tag. Please see this link for more information on Tag Spam?
Please take this into consideration and help build a great platform!