Cybersecurity - Deepstash
Cybersecurity

Cybersecurity

Joaquin Jay Gonzalez III

14

Harnessing Blockchain Technology

Learn more about books with this collection

Understanding the basics of blockchain technology

The benefits and challenges of using blockchain

The future of blockchain technology

Harnessing Blockchain Technology

Discover 57 similar ideas in

It takes just

8 mins to read

What is Hacking?

What is Hacking?

Hacking is a term used to refer to a wide range of attacks on the internet - from crashing a server, to sophisticated infiltration - leading to stealing passwords, personal information, privy business data or intellectual property.

29

344 reads

Types of Hackers

Types of Hackers

There are many types and this keeps evolving. The notable ones are:

  • Crackers
  • Script Kiddies
  • Black Hat Hackers
  • White Hat Hackers
  • Grey Hat Hackers
  • Cyber Troops
  • Spammers
  • Phishers

36

310 reads

Crackers And Skiddies

Crackers And Skiddies

Crackers are the ones that are typically engaged in trading and publishing 'cracks' for games, patches, serial numbers and activation keys for commercial software. They may embed malware in their cracks and patches called as Trojans. If these cracks are used, there is risk of getting infected with worms or viruses.

Script Kiddies, or 'Skiddies' are amateur hackers who adapt other people's exploits to attack institutions and may take part in online anonymous protest groups.

28

219 reads

Black Hats, White Hats And Grey Hat Hackers

Black Hats, White Hats And Grey Hat Hackers

Black Hat Hackers develop malware, intrusion techniques and tools for evil purposes and have an ulterior motive of profiting from it. Spy agencies, criminal groups and enemies of establishments tend to pay them for such exploits.

White Hat Hackers, or Ethical Hackers maybe good guys or security researchers who undertake penetration testing and security audits, while operating within the law. They report vulnerabilities to help fix the loopholes.

Grey Hat Hackers may expose vulnerabilities to fraudulent actors and may report vulnerabilities anonymously.

28

172 reads

Cyber Troops Or Cyber Soldiers

Cyber Troops Or Cyber Soldiers

These are state-sponsored military personnel trained in hacking techniques.

They may use malware and hacking to spy or steal intellectual property to gather enemy intelligence.

27

226 reads

Spammers And Phishers

Spammers And Phishers

Spammers use spambot programs to send automated emails, messages, tweets etc. to entice the potential buyers of their products.

Phishers may use similar techniques disguised as click baits, to entice their victims to download and install malware.

30

242 reads

CURATED BY

madspeak

Lifelong Learner. Audible Fan. Deep Generalist.

More like this

The Mythical Man-Month

15 ideas

The Mythical Man-Month

Frederick P. Brooks Jr.

Book

6 ideas

Book

Hugh McGuire, Brian Francis O'Leary

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving & library

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Personalized recommendations

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates