Cyber Security & Ethical Hacking | Online classes | contact us : +91 9989445901.
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.
Cyber security covers not only safeguarding confidentiality and privacy, but also the availability and integrity of data, both of which are vital for the quality and safety of care..
COMMON TYPES OF CYBER ATTACKS:
- Malware
- Phishing
- Man-In-The-Attack
- Denial of service attack.
- SQL Injection
- Zero-day exploit
- DNS Tunneling.
ETHICAL HACKING
Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. ... Ethical hackers aim to investigate the system or network for weak points hat malicious hackers can exploit or destroy.Roles and Responsibilities of an Ethical Hacker:
An ethical hacker must seek authorization from the organization that owns the system. Hackers should obtain complete approval before performing any security assessment on the system or network.
· Determine the scope of their assessment and make known their plan to the organization.
· Report any security breaches and vulnerabilities found in the system or network.
· Keep their discoveries confidential. As their purpose is to secure the system or network, ethical hackers should agree to and respect their non-disclosure agreement.
· Erase all traces of the hack after checking the system for any vulnerability. It prevents malicious hackers from entering the system through the identified loopholes.
No comments:
Post a Comment