The world of hacking is a complex and constantly evolving field, with new techniques and technologies emerging all the time. As such, there are many terms used in this field that may be unfamiliar to the average person.
In this article, we will explore a list of terms commonly used in the field of hacking.
S.No. | Term | Meaning |
1 | Adware | Software designed to force pre-chosen ads to display on a system. |
2 | Attack | An action taken on a system to gain access and extract sensitive data. |
3 | Back door | A hidden entry to a computing device or software that bypasses security measures, such as logins and password protections. |
4 | Bot | A program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. |
5 | Botnet | A group of computers controlled without their owners’ knowledge, often used to send spam or make denial of service attacks. |
6 | Brute force attack | An automated and simple method to gain access to a system or website by trying different combinations of usernames and passwords. |
7 | Buffer Overflow | A flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold. |
8 | Clone phishing | The modification of an existing, legitimate email with a false link to trick the recipient into providing personal information. |
9 | Cracker | One who modifies software to access features considered undesirable by the person cracking the software, especially copy protection features. |
10 | Denial of service attack (DoS) | A malicious attempt to make a server or network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. |
11 | DDoS | DDoS stands for Distributed Denial of Service. It is a type of cyber attack where multiple compromised systems, such as computers, servers, or IoT devices, are used to flood a targeted website or online service with traffic. |
12 | Exploit Kit | Software designed to identify software vulnerabilities in client machines communicating with it and exploit those vulnerabilities to upload and execute malicious code on the client. |
13 | Exploit | A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system. |
14 | Firewall | A filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall. |
15 | Keystroke logging | The process of tracking the keys pressed on a computer, often used by hackers to record login IDs and passwords. |
16 | Logic bomb | A virus secreted into a system that triggers a malicious action when certain conditions are met. |
17 | Malware | An umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. |
18 | Master program | The program a black hat hacker uses to remotely transmit commands to infected zombie drones, often used to carry out Denial of Service attacks or spam attacks. |
19 | Phishing | An e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. |
20 | Phreaker | Those who break into the telephone network illegally, typically to make free long distance phone calls or to tap phone lines. |
You may also like:
- Eight Steps Necessary to Rectify a Software Vulnerability
- 6 Steps to Learn Front-End Development
- 7 Open Source Security Tools You Can’t Afford to Ignore
- Top 5 Most Used Programming Languages in 2024
- 9 Apps You Need But Didn’t Know About
- Top 18 Cybersecurity Tips to Keep You Safe
- Top 20 Active Directory (AD) Attack Methods
- The Top 10 Free VPNs Which Are Safe and Allow You to Access Blocked Content
- Seattle Airport Hit by Possible Cyberattack, Websites & Phone Systems Were Impacted
- How to Choose the Best E-Commerce Web Hosting for Maximum Uptime