Basics of CS EH – I

From here we shall refer Cyber Security and Ethical Hacking as CS EH.

We have learnt what is CS and EH. What does it have in for us? To get the answer, let’s begin with basics.

A PC, and a smart guy with a bag full of contents that may contaminate the life of the user(of PC).

How was he able to get information from the PC?

The PC might be having less security or the user might have clicked on some malicious links or might have downloaded a software from a distrusted website. Now, the user’s PC can be easily accessed by intruders! This is vulnerability. Formally speaking, Vulnerability is the weakness of a computer which can be exploited by an attacker, to perform unauthorized actions within a computer system.

The act of successfully taking the unauthorized access from the user by taking the advantage of vulnerability is Exploitation. What if someone have taken away the access from you? If he has the data of yours, what it can lead to? It could cause a harm to an individual or a community. This is a threat. A threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. A threat can be either “intentional” or “accidental” or otherwise a circumstance, capability, action, or event.

For anything happening, there is before, now and after. So, the harm that comes after the attack is risk. A risk is commonly defined as exposure to harm or loss resulting from breaches(leaks) of or attacks on information systems.

We are speaking about attacks, intruders, leaks, etc. Can we catch them? There are much more things to look into. We shall follow – “Slow and steady wins the race!!”

Stay Home Stay Safe!!!

One thought on “Basics of CS EH – I

Leave a comment