2. The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called
Hacking.
Hacker: In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a computer
system or computer network.
4. Website Hacking : Hacking a website means taking control from the website owner to
a person who hacks the website.
Network Hacking : Network Hacking is generally means gathering information about
domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the
network.
Email Hacking: Email hacking is unauthorized access to an email account or email
correspondence.
Password Hacking : Password Hacking Password cracking is the process of recovering
secret passwords from data that has been stored in or transmitted by a computer
system
Online Banking Hacking: Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without permission of account holder is
known as Online banking hacking.
Computer Hacking: Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a
system and then usually patches them.
5. Thrill-Seeker Hacker: Person who break into a computer system for
entertainment the reward is usually admiration of their fellow hackers
White-Hat Hackers: The hackers who legitimately , with the knowledge of the
owners of the IT system, try to break in to find and fix vulnerable area of the
system. They are also called ethical Hackers, counter hackers or penetration
hackers.
Black-Hat Hackers : They exploit or destroy the information they find steal
passwords, or otherwise cause harm to the computer network for some benefits
Hacktivist : Are politically motivated hackers who use the internet to send a
political message of some kind.
Eg: Indian government sites are hacked by Pakistan hackers for political gain
Cyber terrorists: is one who seeks to cause harm to people or destroy critical
systems or information. Possible targets of violent attacks would be air traffic
control systems and nuclear power plants, or anything that could harm the
infrastructure of a nation.
6. Using Firewalls
Using Anti Virus Software
Restrict software installation
Change default passwords on systems and devices
Do not use official email ID to subscribe to public groups
Data encryption
Do not expose your passwords to untrusted websites
Practice to use exact web address
Turn off your internet connection when not in use