CYBERSECURITY
Cyber security is preparing for what’s next, not what was last. Cybersecurity may be fought with technology, but it is people who triumph. We must invest in the future generations of professionals who will carry on the fight.

Cybersecurity is the science of protecting networks, computers, programs and data from attack, damage or unauthorized access.
•Knowing what to do ---- science of cybersecurity,•Knowing how to do -- --engineering of cybersecurity.Defining cybersecurity more technically “It is a ability to protect or defend the use of cyberspace from cyberattacks.” Cyberspace: It is a global domain within the information environment consisting of the interdependent network of information systems infrastructure including the Internet, computer systems, telecommunication networks.
A computer virus is a malicious program loaded into a user’s computer without knowledge and runs against your wish. These virus are self-replicating and also designed to infect other programs.
They are considered as good guys because they follow the rules when it comes to hacking,People who specialized hacking check the faults of the systems.,In other words ,white hat hackers are the opposite of the black hat hackers. They’re the “ethical hackers”, experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes rather than bad, unethical, and criminal purposes.
They are both black and white hat,These type of hackers do not work for their own gain or to cause carnage but technically commit crimes and do arguably unethical things,•Grey hats might not use their access for bad purposes but they still compromise cyber security without permission ,which is illegal.
•Black hat hackers are called as “cybercriminals”.,•They are malicious hackers who break the law to achieve their goals.These hackers penetrate systems without permission to exploit known or zero -day vulnerabilities.,Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network

Comments
Leave Comment