CYBER SECURITY AND ETHICAL HACKING


 SOME FUNDAMENTAL TERMS 

RELATED TO
CYBER SECURITY AND ETHICAL HACKING



1. ENCRYPTION



Encryption is essentially a code used to hide the contents of a message or data. It’s an ancient technique, but the old methods are far simpler than what we use today. The earliest encryption methods tended to involve either changing the order of the letters, or substituting letters with other characters.







2. CLONE PHISHING


Neuroon Networks: Phishing Attacks


In this attack, criminals make a copy—or clone—of previously delivered but legitimate emails that contain either a link or an attachment. Then, the phisher replaces the links or attached files with malicious substitutions disguised as the real thing. Unsuspecting users either click the link or open the attachment, which often allows their systems to be commandeered. Then the phisher can counterfeit the victim's identity in order to masquerade as a trusted sender to other victims in the same organization.
“Phishing is the simplest kind of cyber attack and, at the same time, the most dangerous and effective.”

 





3. CRYPTO JACKING


Spyware, Cyber, Cyber Crime, Security
Crypto jacking (also called malicious crypto mining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web browsers, as well as compromise all kinds of devices, from desktops and laptops, to smart phones and even network servers.


Like most other malicious attacks on the computing public, the motive is profit, but unlike many threats, it’s designed to stay completely hidden from the user. To understand the mechanics of the threat and how to protect yourself against it, let’s begin with a bit of background.




4.  SPYWARE




Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

Spyware can infect your system in the same ways that any other malware does, by means of a Trojan, a virus, worm, exploit, and other types of  malware.



5. COLDBOOT ATTACK

The Chilling Reality of Cold Boot Attacks - F-Secure Blog

Cold boot attacks demonstrate that disk encryption programs, which are used to protect data on desktops, laptops and various other computing devices, have no reliably secure location in which to store their keys. The attack is carried out by performing a cold boot of the system and dumping the contents of the DRAM to a CD or USB token. The memory image is then scoured for data structures that store the decryption key. With this data, an attacker can obtain encryption keys either by copying the entire encrypted partitions or rebooting the machine and using the computer's encryption software to decrypt it.

A cold boot attack is a process for obtaining unauthorized access to a computer's encryption keys when the computer is left physically unattended.


6. SWIFT Code


Real Estate, Safety, House, Home
SWIFT Code (Society for Worldwide Interbank Financial Telecommunication) or BIC (Bank Identifier Code) is a unique identification code for a particular bank. These codes are used when transferring money between banks, particularly for international wire transfers. The Swift code consists of 8 or 11 characters.

SWIFT Code Format : AAAA-BB-00-YYY
First 4 characters - bank code (only letters)
Next 2 characters -country code (only letters)
Next 2 characters - location code (letters and digits)
Last 3 characters - branch code  


7. DATA MINING


Text & Data Mining - Copyright


Data mining is a concept first realized when businesses began storing important information on computer databases and extracting useful information from large sets of data. It is a fairly new method that can only be described as discovering hidden values from within a large amount of unknown data. Data mining is a reliable way for different companies to predict future trends and behaviors from within their business, allowing them to make better decisions going forward. 


8. DATA ACQUISITION

Data Acquisition - Data Science Tutorial | Intellipaat.com
Alternatively referred to as a data capture, data acquisition is the process of collecting and organizing information. The method of data acquisition varies, from reading a book to performing an experiment and observing the results. In computing, data acquisition is used to gather information electronically and allow it to be stored, searched, or organized more efficiently.


9. DATA MANIPULATION


Data manipulation is the process of changing data to make it easier to read or be more organized. For example, a log of data could be organized in alphabetical order, making individual entries easier to locate. Data manipulation is often used on web server logs to allow a website owner to view their most popular pages as well as their traffic sources.


10. GROWTH HACKING  



Growth hacking is an umbrella term for strategies focused solely on growth. It is usually used in relation to early-stage startups who need massive growth in a short time on small budgets.
The goal of growth hacking strategies is generally to acquire as many users or customers as possible while spending as little as possible. The term “growth hacking” was coined by Sean Ellis, founder and CEO of Growth Hackers, in 2010.





NOTE: OUR EACH AND EVERY PICTURE OF THIS BLOG IS DIRECTLY TAKEN BY GOOGLE.COM AND SOME CONTENT IS ALSO COPIED FROM GOOGLE FOR BETTER ANALYTICS AND PROPER REPORT. 

THANK YOU VERY MUCH 

PLEASE SHOW YOUR LOVE BY LIKE , COMMENTS AND SUBSCRIBE US 
FOR MORE TECH RELATED CONTENT

our telegram link
 https://t.me/w36c0d3r


Our youtube teaser video
https://youtu.be/D5XwOuB4ZMg


http://www.scriptkiddies.cf/
our website link


https://www.scriptkiddieshackers.com/2020/06/hacking-hacking-refers-to.html
our blog link


https://instagram.com/script_kiddies_developers?igshid=17prws6olul0r
Our Instagram page link 
https://instagram.com/team_script_kiddies?igshid=ei7vr4q1vpls


FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN 



Post a Comment

7 Comments

  1. Awesome content for ethical hacking learners they knew its value

    ReplyDelete
    Replies
    1. Thank you very much
      Hope you like my work
      Keep supporting us
      And also check some other posts too
      😊😊

      Delete
  2. This comment has been removed by the author.

    ReplyDelete
  3. This is straight forward nice compilation

    ReplyDelete
  4. This is such a great resource that you are providing and you give it away for free. I love seeing blog that understand the value of providing a quality resource for free. Cracking

    ReplyDelete
  5. Bitcoin is on the ascent as an advanced cash utilized around the world. It is a sort of cash controlled and put away altogether by PCs spread over the Internet. More individuals and more organizations are beginning to use it. bitcoin mixer

    ReplyDelete