• White hat hackers
  • Black hat hackers
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet189/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   185   186   187   188   189   190   191   192   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Cybersecurity Ethics
    The cybersecurity field has expanded its horizon by leaps and bounds. As
    new software systems started to develop there came a lot of importance for
    the cybersecurity department due to potential vulnerabilities that may make
    the companies lose money by some anonymous attacks. For this reason, a
    lot of industries started offering security solutions for example like Cisco
    security solutions to protect their clients from potentially dangerous attacks.
    For this reason, they started to recruit a lot of system engineers who have
    sound knowledge of database security. Decades later now cybersecurity is
    one of the pioneering fields in computer technology. There are a lot of
    software and tools that provide automated solutions. And there is still a lot
    of necessity of manual labor. 
    In this chapter, we will discuss the ethics of cybersecurity in detail. First of
    all, recite a simple fact that everyone who deals with security is called a


    hacker. We will now discuss the three most famous types of hackers that are
    distinguished for a better understanding.
    a) White hat hackers 
    b) Black hat hackers
    c) Grey hat hackers
    That's it. We will now discuss each of them in detail.
    White hat hackers
    These are the type of hackers who try to protect databases and servers from
    being exploited by the bad boys. They usually try to find vulnerabilities in
    the system and try to fix them as soon as possible. They use different
    hacking and network tools to track the resources and systems they are
    dealing with. White hat hackers are a role model and will inspire a lot of
    novice hackers to walk on the good side. 
    Black hat hackers
    These are the type of hackers who try to exploit systems using different
    techniques. These guys are usually professional and will follow a lot of
    precautions to not get caught. They create their defective mechanisms like
    trojans and worms to exploit systems. Black hat hackers use services like
    VPN, Tor to hide their identity.

    Download 6,34 Mb.
    1   ...   185   186   187   188   189   190   191   192   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish