Hacking has been a part of computing for almost five decades and it is a very broad
discipline, which covers a wide range of topics. The first known event of hacking had
taken place in 1960 at MIT and at the same time, the term "Hacker" was
originated.
This is some Essential terminologies to understand the different actions use to do
"Hacking" in general:
Hack Value: It is the notion among hackers that something is worth doing or is interesting.
Target of Evaluation: An IT system,product, or component that is identified/subjected to a required security evaluation.
Attack: *An assault on the system security derived from an intelligent threat.
*An attack is any action violating security.
Exploit: A defined way to breach the security of an IT system through vulnerability.
A Zero-Day: A computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer.
Security: A state of well-being of information and infrastructure in which the possibility of theft,tampering,and disruption of information and services is kept low or tolerable.
Threat: *An action or event that might compromise security.
*A threat is a potential violation of security.
Vulnerability: Existence of a weakness,design,or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
Daisy Chaining: Hackers who get away with database theft usually complete their task,then backtrack to cover their tracks by destroying logs,etc.
ConversionConversion EmoticonEmoticon