There are many terminologies used in the field of ethical hacking, some common ones include:
- White Hat Hacker: An ethical hacker or a security professional who uses their hacking skills for defensive purposes, such as identifying vulnerabilities in a network so they can be fixed.
- Black Hat Hacker: An individual who uses their hacking skills for illegal or malicious purposes, such as stealing sensitive information or disrupting systems.
- Grey Hat Hacker: An individual who may not have malicious intent, but who uses their skills in ways that might not be strictly legal, such as penetrating a network without authorization for the purpose of identifying vulnerabilities.
- Penetration Testing: The practice of attempting to identify vulnerabilities in a network or system by simulating an attack from a malicious outsider.
- Vulnerability Scanning: The process of identifying vulnerabilities in a network or system using automated tools.
- Social Engineering: The practice of tricking people into giving away sensitive information or access to a network or system.
- Rootkit: A type of malicious software that is designed to conceal the presence of other malware on a system.
- Phishing: A type of social engineering attack that involves tricking people into providing sensitive information, such as login credentials, by disguising oneself as a trustworthy entity.
- Malware: software that is designed to damage, disrupt, or control a computer or computer network.
- Denial of Service (DoS) attack: A type of attack that aims to make a network or system unavailable to legitimate users by overwhelming it with traffic or otherwise disrupting its normal operation.
- Distributed Denial of Service (DDoS) attack: A type of attack that involves multiple systems being used to launch a coordinated attack against a single target.
- Firewall: A system or device that is used to control and monitor incoming and outgoing network traffic, in order to prevent unauthorized access and block malicious traffic.
- Intrusion Detection System (IDS): A system that is designed to detect and alert on possible security breaches or attempts at unauthorized access to a network or system.
- Intrusion Prevention System (IPS): A system that is designed to prevent unauthorized access to a network or system by actively blocking or shutting down connections that match certain criteria.
- Authentication: The process of verifying that a person or system is who or what it claims to be.
- Encryption: The process of converting plain text into a coded or encrypted format in order to protect it from unauthorized access.
- Key: A piece of data that is used in conjunction with an encryption algorithm to encrypt and decrypt data.
- SSL (Secure Sockets Layer)/TLS (Transport Layer Security): Protocols that are used to secure communication over networks by encrypting the data that is being sent and verifying the identity of the parties involved.
- Honeypot: A system that is set up to mimic a real network or system in order to attract and detect attempts at unauthorized access or malicious activity.
- Vulnerability Assessment: The process of identifying, analyzing, and prioritizing vulnerabilities in a network or system in order to determine the risk that they pose and the need for remediation.
- Incident Response: The process of identifying, responding to and resolving a security incident.
- Compliance: the ability of an organization to adhere to regulatory standards, guidelines and laws related to data privacy and security
- Zero-day exploit: An exploit that targets a previously unknown vulnerability in a system or application.
- Payload: The actual malicious code or functionality that is delivered by an exploit.
- Command and Control (C&C): The process of remotely controlling an infected system after a successful exploit.
- Advanced Persistent Threat (APT): A type of cyber-attack that is carried out by a skilled and well-resourced attacker with the intention of maintaining long-term access to a target network or system.
- Advanced Evasion Technique (AET): A technique used to evade detection by intrusion prevention systems and intrusion detection systems, by hiding the malicious payload in normal traffic
- Malware Sandbox: An isolated environment where files or codes can be executed and analysed for any malicious behaviour without putting the system at risk.
- Reverse Engineering: the process of taking apart and analysing the code of an application or software in order to understand its inner workings.
- Exploit Kit: A software kit that is used by attackers to automate the process of delivering and exploiting vulnerabilities in a target system.
- Botnet: A group of compromised computers that are controlled remotely by a single attacker, and can be used to launch large-scale attacks or distribute malware.
- Ransomware: A type of malware that encrypts the files of an infected system, and demands payment in exchange for the decryption key.
- Fileless malware: malware that reside in memory and doesn’t leave any traces on the hard drive.