Professional Documents
Culture Documents
components
ETHICAL HACKER
CRACKER(BLACK HAT)
GREY HAT
HACKTIVIST
Symbol Description
Type of Cybercrime
The following list presents the common types of
cybercrimes:
Computer Fraud
Privacy violation
Identity Theft.
Information Electronic
transfer
Potential security threat
A computer system threat is anything that leads to loss or
corruption of data or physical damage to the hardware and/or
infrastructure.
• Security threat
• Security Threat is defined as a risk that which can potentially
harm computer systems and organization.
• The cause could be physical
• The cause could also be non-physical
• Programing language that re useful to hackers
WEB HACKING
LANGUAGE USE TO WRITE
HTML WEB PAGES Login forms and other data
entry methods on the web
use HTML forms to get
data. Been able to write
and interpret HTML, makes
it easy for you to identify
and exploit weaknesses in
the code.
JAVA SCRIPT CLIENT SIDE SCRIPTING
LANGUAGE
Web Hacking
CLIENT -
Clients are computers that access and use the network and shared
network resources.
Client computers are basically the customers(users) of the network, as
they request and receive services from the servers.
These days, it is typical for a client to be a personal computer that the
users also use for their own non-network applications.
Transmission Media
Transmission media are the facilities used to interconnect computers in a network, such
as twisted-pair wire, coaxial cable, and optical fiber cable.
Shared data
- Shared data are data that file servers provide to clients such as data files, printer
access programs and e-mail.
Shared printers and other peripherals - Shared printers and peripherals are hardware
resources provided to the users of the network by servers.
Resources provided include data files, printers, software, or any other items used by
clients on the network.