Types Of Hacking
- Created by: BJP06
- Created on: 09-12-21 11:38
View mindmap
- Types of Hacking
- The "Hats"
- White Hat Hacking
- A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing
- Black Hat Hacking
- A black hat hacker is a hacker who violates computer security for their own personal profit or out of malice.
- Grey Hat Hacking
- A grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. The term came into use in the late 1990s, derived from the concepts of "white hat" and "black hat" hackers.
- White Hat Hacking
- Uses of Different computing viruses
- Boot sector virus
- This type of virus can take control when you start — or boot — your computer. One way it can spread is by plugging an infected USB drive into your computer.
- Web scripting virus
- This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer.
- Browser hijacker
- This type of virus “hijacks” certain web browser functions, and you may be automatically directed to an unintended website.
- Resident virus
- This is a general term for any virus that inserts itself in a computer system’s memory. A resident virus can execute anytime when an operating system loads.
- Direct action virus
- This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant.
- Polymorphic virus
- A polymorphic virus changes its code each time an infected file is executed. It does this to evade antivirus programs.
- File infector virus
- This common virus inserts malicious code into executable files — files used to perform certain functions or operations on a system.
- Multipartite virus
- This kind of virus infects and spreads in multiple ways. It can infect both program files and system sectors.
- Macro virus
- Macro viruses are written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments.
- Boot sector virus
- The "Hats"
Comments
Report