Security Breeches ( Spamming , Spoofing , Phishing , Hacking etc )
Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: Web search engine spam, spam in blogs etc. Email spam, also known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. A person who creates electronic spam is called a spammer.
Spoofing
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.
Types of Hackers & Ethical hacking
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.
White Hat Hacker
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.
Black Hat Hackers
Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
Grey Hat Hacker
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker.
Cryptography
Cryptography is the science of secret writing. This word emerged from the greek words 'krupto' means secret and 'graph' means writing.
Encryption
Encryption is the process of transforming plain text to unreadable scrambled text called cipher text.
Decryption
Decryption is the reverse process of encryption , ie it converts unreadable cipher text back to plain text.
Need of Security Protocols like HTTPS and SSL
Hypertext Transfer Protocol Secure (HTTPS) is a widely used communications protocol for secure communication over a computer network.
HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.
Eavesdropping
Eavesdropping is the act of secretly listening to the private conversation of others without their consent.
No comments:
Post a Comment