Ethical Hacking 1

Hello and Welcome to NEWAGEINFORMERS!!!

Today, I am going to start a series on Ethical Hacking Tutorials to spread awareness. This series of Ethical Hacking Tutorial is for Educational purpose only, any wrong and illegal activity is not promoted by me or my team of NEW AGE INFORMERS. In this first tutorial, we will be looking at what is cyber security, why we need it, who are the hackers and much more. So, without wasting time, let's get started with it.

What is Cyber Security?

Cybersecurity is the act of securing frameworks, systems, and projects from advanced assaults. These cyberattacks are typically initiated for changing, or crushing touchy data; blackmailing cash from clients; or intruding on ordinary business forms. In simple words, I can say, it is a process of making digital data secure using various tools and techniques before an attacker or bad guy tries to access it.


Why we need Cyber security?

Nowadays, everything is online and lots data is being saved in the digital format. To keep it secure, cyber security is required. Attackers are attacking various companies daily with lots of hacking skills in order to gain unauthorized access to the data of users. And in order to keep such important data out of reach of hackers or bad guys, Cyber security is necessary and must in today's world. Increasing corporate risks makes the field of cyber security most important and growing.

Hackers!!!

When a word "HACKER" comes to our mind, we start keeping distance from that them. We start assuming that person is a bad guy as media has made a negative reputation of hackers. But the true fact is not all hackers are bad one. Hackers are divided in 3 major parts. They are:-
1) White Hat Hackers
2) Black Hat Hackers
3) Grey Hat Hackers

Now let us understand them one by one, but before that I would like to clearify one myth that nor any of the hacker used to wear hat in real life with this colors, this is just to understand also based on the intention of a hackers behind hacking.

=> White Hat Hacker:- Color of hat itself suggest us that they must be good person. Those hackers or cyber security experts who hacks into the systems with full permission of the owner to find out the loop holes into the system comes under this category. They are often known as 'Ethical Hackers' or 'Penetration Tester'. They use the same methods of hacking as black hats but for good purpose only. They do penetration testing to protect data, systems and infrastructure before black hats do have access to it.


=> Black Hat Hacker:- These are the hackers who hacks into the system illegally to earn money and get access to the data which they are not supposed to have access. They are also known as 'Unethical hackers'. These are the bad guys who attacks giant companies in order to get user data and then they used to earn money by selling data on darkweb or using that information to hack into the users' bank account to get money.

=> Grey Hat Hackers:- Grey Hat hackers are those ones who can hack into any system without any legal permission to check the security of that system. usually, they don't steal money from such systems and informs to the administrator about that flaw in the security. But ultimately, performing hacks without permission makes it illegal activity.

Apart from these majorly distinguished hackers, we have several more variety in this. Other types of hackers will be discussed in next tutorial. Till the time be safe, be secure.

For any more questions regarding this tutorial, feel free to drop your questions and reviews after reading in comment section. Thank you!

To be continued...

Comments