Cyber Security and Ethical Hacking
Cyber Security and Ethical Hacking
HACKING
CYBERSECURITY: the state of being protected against the criminal or
unauthorized use of electronic data or the measures taken to achieve this.
TYPES OF HACKERS:
1.white hat hackers:
these are also known as ethical hackers . they try to find out the
weaknesses in a computer or a network system as a part of penetration
testing and vulnerability assessments.
Script kiddie:
a script kiddie is a non-expert who breaks into computer systems by using pre-packaged
automated tools written by others,usually with little understanding of the underlying concept.
Hacktivist:
a hacktivist is a hacker who utilizes technology to announce a social,ideological,religious or
political message.most hacktivism involves website defacement or denial-of-service attacks.
TYPES OF NETWORKS:
An operating system (OS) is system software that manages computer hardware and software
resources and provides common services for computer programs.
BIOS UEFI
1.Bios was the first firmware for desktop 1.UEFI is the successor to BIOS
2.It uses master boot record(MBR) 2.it uses GUID partition table(GPT)
partitioning scheme
3.Max partition size in MBR is 2TB 3.the partition size in GPT is 9ZB
4.MBR can have at max 4 primary 4.in GPT it can have 128 partitions.
Partitions.
LINUX:
Linux is a Unix like, open source and community-developed operating system for computers, servers,
mainframes, mobile devices and embedded devices.
Windows Linux
1.It is Expensive 1. it is Free of cost
2.it is not an open source 2.it is an open source
A kernel is the central part of an operating system. It manages the operations of the computer
and the hardware - most notably memory and CPU time.
IP Address:
IP address is an Internet Protocol address. The IP address is used to identify the different computers
and websites on the internet or intranet. Each device must have a unique IP address.
An IP address is made up of 4 separate numbers, each between 0 and 255, and arranged with dots
in between them.there are two versions of IP address (IPv4 and IPv6).
STATIC IP:
A static IP address is an IP address that was manually configured for a device, versus one that was
assigned via a DHCP server. It's called static because it doesn't change.
Routers, phones, tablets,desktops, laptops, and any other device that can use an IP address can be
configured to have a static IP address.
DYNAMIC IP:
A dynamic IP is assigned to a node until it’s connected to the network; therefore, the same node may
have a different IP address every time it reconnects with the network. It’s called dynamic because it
changes.
SUBNET MASK:
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network
address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to
all "0"s.
Within a given network, two host addresses are reserved for special purpose, and cannot be assigned to
hosts. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and
they cannot be assigned to hosts.
OSI MODEL:
OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
1.Application layer:
This layer provides application services for file transfers, e-mail, and other network software services.
2.Presentation layer:
The presentation layer works to transform data into the form that the application layer can accept. This layer
formats and encrypts data to be sent across a network, providing freedom from compatibility problems.
3.Session layer:
The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection coordination.
4.Transport layer:
provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-
end error recovery and flow control. It ensures complete data transfer.
5.Network layer:
provides switching and routing technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet sequencing.
7.Physical layer:
conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical
and mechanical level. It provides the hardware means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects.
FIREWALL:
A firewall is a network security system designed to prevent unauthorized access to or from a private
network.
Firewalls can be implemented as both hardware and software, or a combination of both. Network
firewalls are frequently used to prevent unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which examines each message
and blocks those that do not meet the specified security criteria.