Hello and Welcome to Dark Street Hackers!!!

Continuing the previous session of terminologies, we will look at the remaining basic terminologies which are used frequently in the world of cyber security.

1) Keylogger:- Keylogger is also known as Key Stroke logger. It is a type of vigilance technology which is build for observing and recording each and every key pressed on the keyboard. In simple words, we can say that it an example of spyware software which keeps an eye on the user by logging his/her key strokes. It logs all the emails, instant messages and passwords typed.

2) Malware:- Malware refers to a type of malicious software which is explicitly built to harm, hamper data, or gain an unauthorized access of any computer system. The word Malware is a combination of 2 different words "Malicious Software".


3) Phishing:- It is a kind of deception in which an attacker represents him/her as a reputable individual or company in any communication channels like email, instant messaging in order to make an individual click on the link which is malicious. It is a type of social engineering technique which makes a victim click on the malicious link to gather their personal information.





4) Rootkit:- Rootkit refers to the set of malicious programs, specially designed, to get unauthorized remote access or control over the whole computer system. In other words, it gives the root privileges to the attackers by hiding their presence on the system. It can be installed in may ways including social engineering, phishing, etc.

5) Social Engineering:- Social engineering is a technique of gathering confidential information such as usernames, passwords, credit card details and more with the help of psychology by manipulating human emotionally.

6) Spam:- It is a messaging structure made to send unwanted and unrequested message in bulk to trouble the victim. Many of times, spamming is used to execute phishing attack as well.

7) Spoofing:- Spoofing refers to the technique of decepting a communication and tampering the message and sending it as a known or trusted entity to the other end of communication. In this attack, hackers do identity theft and become someone who is known or trusted by the victim. Spoofing can be of different types including email spoofing, IP spoofing, URL spoofing, Caller ID spoofing and so on.

8) Spyware:- For an instance, it sounds like a cool gadget from the list of advanced gadgets of James Bond. Yeah, it is a malicious program installed in the victim's computer without user's knowledge. It gathers information by monitoring user's Internet data and sends it to the attacker. Spyware is used for many different purposes, based on the intention of a user. For example, parents can spy on their child's online activity, an employer can keep an eye on his/her employees online activities, etc.

9) Virus:- Computer virus is a malicious program which replicates itself by adding code in other computer programs once it is executed unknowingly by the user. Once the replication gets completed, it is said that the area or folders where it is being replicated is now infected by virus. Sometimes, dangerous virus affects the OS level files and corrupts whole computer system, depending on the toxic nature of it.


 10) Worms:- Unlike virus, Worm also replicates itself without any need of user interaction. It spreads wildly using computer network. It infects all the devices connected in the network once it gets into a single system. Also, it does not require any file to get attached in order to spread copies of itself.

That is it for the session of basic terminologies, from next tutorial, we will start the core of Ethical Hacking. Till the time, stay safe!

Thank you.

0 Comments