Cybersecurity - Deepstash

Explore the World's Best Ideas

Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.

What is Hacking?

What is Hacking?

Hacking is a term used to refer to a wide range of attacks on the internet - from crashing a server, to sophisticated infiltration - leading to stealing passwords, personal information, privy business data or intellectual property.

35

383 reads

Types of Hackers

Types of Hackers

There are many types and this keeps evolving. The notable ones are:

  • Crackers
  • Script Kiddies
  • Black Hat Hackers
  • White Hat Hackers
  • Grey Hat Hackers
  • Cyber Troops
  • Spammers
  • Phishers

43

346 reads

Crackers And Skiddies

Crackers And Skiddies

Crackers are the ones that are typically engaged in trading and publishing 'cracks' for games, patches, serial numbers and activation keys for commercial software. They may embed malware in their cracks and patches called as Trojans. If these cracks are used, there is risk of getting infected with worms or viruses.

Script Kiddies, or 'Skiddies' are amateur hackers who adapt other people's exploits to attack institutions and may take part in online anonymous protest groups.

34

246 reads

Black Hats, White Hats And Grey Hat Hackers

Black Hats, White Hats And Grey Hat Hackers

Black Hat Hackers develop malware, intrusion techniques and tools for evil purposes and have an ulterior motive of profiting from it. Spy agencies, criminal groups and enemies of establishments tend to pay them for such exploits.

White Hat Hackers, or Ethical Hackers maybe good guys or security researchers who undertake penetration testing and security audits, while operating within the law. They report vulnerabilities to help fix the loopholes.

Grey Hat Hackers may expose vulnerabilities to fraudulent actors and may report vulnerabilities anonymously.

35

194 reads

Cyber Troops Or Cyber Soldiers

Cyber Troops Or Cyber Soldiers

These are state-sponsored military personnel trained in hacking techniques.

They may use malware and hacking to spy or steal intellectual property to gather enemy intelligence.

33

251 reads

Spammers And Phishers

Spammers And Phishers

Spammers use spambot programs to send automated emails, messages, tweets etc. to entice the potential buyers of their products.

Phishers may use similar techniques disguised as click baits, to entice their victims to download and install malware.

36

270 reads

IDEAS CURATED BY

madspeak

Lifelong Learner. Audible Fan. Deep Generalist.

Madhu Kalale's ideas are part of this journey:

Harnessing Blockchain Technology

Learn more about books with this collection

Understanding the basics of blockchain technology

The benefits and challenges of using blockchain

The future of blockchain technology

Related collections

Discover Key Ideas from Books on Similar Topics

Theory U

7 ideas

Theory U

C. Otto Scharmer

Book

6 ideas

Book

Hugh McGuire, Brian Francis O'Leary

The Mythical Man-Month

15 ideas

The Mythical Man-Month

Frederick P. Brooks Jr.

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

100+ Learning Journeys

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates