Hacking Basic Terminologies
Basic Terminologies

1. Adware – Adware refers to any piece of software or application that displays advertisements on your computer.
2. Anti-Virus Software – Anti-virus software is a computer program used to prevent, detect, and remove malware.
3. Attachment – An attachment is a computer file sent with an email message.
4. Authentication – Authentication is a process that ensures and confirms a user’s identity.
5. Back door – A backdoor is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
6. Backup – To make a copy of data stored on a computer or server to reduce the potential impact of failure or loss.
7.Baiting – Online baiting involves enticing a victim with an incentive.
8. Botnet – A botnet is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware.
9. Bug – A bug refers to an error, fault or flaw in a computer program that may cause it to unexpectedly quit or behave in an unintended manner.
10. Cloud Computing – The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
11. Cookie – Cookies are small files which are stored on a user’s computer. Cookies provide a way for the website to recognize you and keep track of your preferences.
12. Critical Update – A fix for a specific problem that addresses a critical, non-security-related bug in computer software.
13. DDoS Attack – A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
14. Domain name – The part of a network address which identifies it as belonging to a particular domain.
15. Domain Name Server – A server that converts recognisable domain names into their unique IP address
16. Download – To copy (data) from one computer system to another, typically over the Internet.
17. Firewall – A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet.
18. Hacking – Hacking refers to an unauthorised intrusion into a computer or a network.
19. HTML – Hypertext Markup Language (HTML) is the standard markup language for creating web pages and web applications.
20. Identity theft – Identity theft is a crime in which someone uses personally identifiable information in order to impersonate someone else.
21. Internet of things (IoT) – The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, collecting and sharing data.
22. IP Address – An IP address is an identifying number for a piece of network hardware. Having an IP address allows a device to communicate with other devices over an IP-based network like the internet.
23. IOS – An operating system used for mobile devices manufactured by Apple.
24. Keystroke logger – A keystroke logger is software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you are unaware actions are being monitored.
25. Malware – Malware is shorthand for malicious software and is designed to cause damage to a computer, server or computer network.
26. Memory stick – A memory stick is a small device that connects to a computer and allows you to store and copy information.
27. MP3 – MP3 is a means of compressing a sound sequence into a very small file, to enable digital storage and transmission.
28. Padlock – A padlock icon displayed in a web browser indicates a secure mode where communications between browser and web server are encrypted.
29. Patch – A patch is a piece of software code that can be applied after the software program has been installed to correct an issue with that program.
30. Penetration testing – Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
31.Phishing – Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
32. Ransomware – A type of malicious software designed to block access to a computer system until a sum of money is paid.
33. Router – A router is a piece of network hardware that allows communication between your local home network and the Internet.
34. Scam – A scam is a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
35. Server – A server is a computer program that provides a service to another computer programs (and its user)
36. Smishing – Smishing is any kind of phishing that involves a text message
37. Spam – Spam is slang commonly used to describe junk e-mail on the Internet.
38. Social Engineering – Social engineering is the art of manipulating people, so they give up confidential information.
39. Software – Software is the name given to the programs you will use to perform tasks with your computer.
40. Spear Phishing – Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
41. Spyware – Spyware is a programme that secretly records what you do on your computer
42. Tailgating – Tailgating involves someone who lacks the proper authentication following an employee into a restricted area.
43. Tablet – A tablet is a wireless, portable personal computer with a touchscreen interface.
44. Traffic – Web traffic is the amount of data sent and received by visitors to a website.
45. Trojan – A Trojan is also known as Trojan horse. It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users’ systems.
46. Two-Factor Authentication – Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are.
47. USB – USB (Universal Serial Bus) is the most popular connection used to connect a computer to devices such as digital cameras, printers, scanners, and external hard drives
48. Virus – A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
49. VPN (Virtual Private network) – A virtual private network gives you online privacy and anonymity by creating a private network from a public Internet connection. VPNs mask your Internet protocol (IP) address so your online actions are virtually untraceable.
50. Vulnerability – A vulnerability refers to a flaw in a system that can leave it open to attack
51. Vishing – Vishing is the telephone equivalent of phishing. It is an attempt to scam someone over the phone into surrendering private information that will be used for identity theft.
52. Whaling – Whaling is a specific form of phishing that’s targeted at high-profile business executives and managers.
53. Worm – A computer worm is a malware computer program that replicates itself in order to spread to other computers.
Welcome back, my novice hackers!

1. Adware – Adware refers to any piece of software or application that displays advertisements on your computer.
2. Anti-Virus Software – Anti-virus software is a computer program used to prevent, detect, and remove malware.
3. Attachment – An attachment is a computer file sent with an email message.
4. Authentication – Authentication is a process that ensures and confirms a user’s identity.
5. Back door – A backdoor is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
6. Backup – To make a copy of data stored on a computer or server to reduce the potential impact of failure or loss.
7.Baiting – Online baiting involves enticing a victim with an incentive.
8. Botnet – A botnet is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware.
9. Bug – A bug refers to an error, fault or flaw in a computer program that may cause it to unexpectedly quit or behave in an unintended manner.
10. Cloud Computing – The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
11. Cookie – Cookies are small files which are stored on a user’s computer. Cookies provide a way for the website to recognize you and keep track of your preferences.
12. Critical Update – A fix for a specific problem that addresses a critical, non-security-related bug in computer software.
13. DDoS Attack – A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
14. Domain name – The part of a network address which identifies it as belonging to a particular domain.
15. Domain Name Server – A server that converts recognisable domain names into their unique IP address
16. Download – To copy (data) from one computer system to another, typically over the Internet.
17. Firewall – A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet.
18. Hacking – Hacking refers to an unauthorised intrusion into a computer or a network.
19. HTML – Hypertext Markup Language (HTML) is the standard markup language for creating web pages and web applications.
20. Identity theft – Identity theft is a crime in which someone uses personally identifiable information in order to impersonate someone else.
21. Internet of things (IoT) – The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, collecting and sharing data.
22. IP Address – An IP address is an identifying number for a piece of network hardware. Having an IP address allows a device to communicate with other devices over an IP-based network like the internet.
23. IOS – An operating system used for mobile devices manufactured by Apple.
24. Keystroke logger – A keystroke logger is software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you are unaware actions are being monitored.
25. Malware – Malware is shorthand for malicious software and is designed to cause damage to a computer, server or computer network.
26. Memory stick – A memory stick is a small device that connects to a computer and allows you to store and copy information.
27. MP3 – MP3 is a means of compressing a sound sequence into a very small file, to enable digital storage and transmission.
28. Padlock – A padlock icon displayed in a web browser indicates a secure mode where communications between browser and web server are encrypted.
29. Patch – A patch is a piece of software code that can be applied after the software program has been installed to correct an issue with that program.
30. Penetration testing – Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
31.Phishing – Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
32. Ransomware – A type of malicious software designed to block access to a computer system until a sum of money is paid.
33. Router – A router is a piece of network hardware that allows communication between your local home network and the Internet.
34. Scam – A scam is a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
35. Server – A server is a computer program that provides a service to another computer programs (and its user)
36. Smishing – Smishing is any kind of phishing that involves a text message
37. Spam – Spam is slang commonly used to describe junk e-mail on the Internet.
38. Social Engineering – Social engineering is the art of manipulating people, so they give up confidential information.
39. Software – Software is the name given to the programs you will use to perform tasks with your computer.
40. Spear Phishing – Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
41. Spyware – Spyware is a programme that secretly records what you do on your computer
42. Tailgating – Tailgating involves someone who lacks the proper authentication following an employee into a restricted area.
43. Tablet – A tablet is a wireless, portable personal computer with a touchscreen interface.
44. Traffic – Web traffic is the amount of data sent and received by visitors to a website.
45. Trojan – A Trojan is also known as Trojan horse. It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users’ systems.
46. Two-Factor Authentication – Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are.
47. USB – USB (Universal Serial Bus) is the most popular connection used to connect a computer to devices such as digital cameras, printers, scanners, and external hard drives
48. Virus – A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
49. VPN (Virtual Private network) – A virtual private network gives you online privacy and anonymity by creating a private network from a public Internet connection. VPNs mask your Internet protocol (IP) address so your online actions are virtually untraceable.
50. Vulnerability – A vulnerability refers to a flaw in a system that can leave it open to attack
51. Vishing – Vishing is the telephone equivalent of phishing. It is an attempt to scam someone over the phone into surrendering private information that will be used for identity theft.
52. Whaling – Whaling is a specific form of phishing that’s targeted at high-profile business executives and managers.
53. Worm – A computer worm is a malware computer program that replicates itself in order to spread to other computers.
Comments
Post a Comment