Terminologies of Hacking

   


Hacking has been a part of computing for almost five decades and it is a very broad 

discipline, which covers a wide range of topics. The first known event of hacking had 

taken place in 1960 at MIT and at the same time, the term "Hacker" was 

originated.

This is some Essential terminologies to understand the different actions use to do 

"Hacking" in general: 


Hack Value: It is the notion among hackers that something is worth doing or is interesting.

Target of Evaluation: An IT system,product, or component that is identified/subjected to a required security evaluation.

Attack: *An assault on the system security derived from an intelligent threat. 
            *An attack is any action violating security.

Exploit: A defined way to breach the security of an IT system through vulnerability.

A Zero-Day: A computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer.

Security: A state of well-being of information and infrastructure in which the possibility of theft,tampering,and disruption of information and services is kept low or tolerable.

Threat: *An action or event that might compromise security. 
            *A threat is a potential violation of security.

Vulnerability: Existence of a weakness,design,or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.


Daisy Chaining: Hackers who get away with database theft usually complete their task,then backtrack to cover their tracks by destroying logs,etc.











Previous
Next Post »