
Ethical Hacking: This involves a process of testing vulnerable areas in a system or network for cyber attacks and fixing them with the consent of an authorized person.Email Hacking: It means accessing the emails of others in an illegal way or without the consent of its owner.This is mainly performed by malicious hackers with an intent to create harm to the network system and hamper its operations. Network Hacking: Network hacking is a method to collect information about the network by using different tools like Ping, Telnet, Tracert, NS lookup, Netstat, etc.Website Hacking: this means unauthorized controlling over a web server, its databases and other interfaces of a website.Below mentioned are the various types of hacking examples. The hacking has been segregated into different types based on what is being hacked. Using Intrusion-detection/prevention strategies can help to protect from denial of service attacks.The authentication strategies should be in the form of Smartcards, User Ids, strong passwords or Biometric, etc. Using strong authentication methods can prevent unauthorized users from accessing the data.

In addition to antivirus, you need to have some control measures on the use of external storage systems and unauthorized programs downloading onto the computer.
Burp suite tutorial point pdf install#
To protect from viruses, worms, Trojans, etc you need to install anti-virus software.The below-mentioned list is the common types of non-physical threats įollowing strategies would help you in protecting your data from the above threats These threats are also termed as logical threats. The non-physical threat is something in which the attacks have to arises in the form of the virus. faulty power supply, hardware fire, internal hardware failovers, etc Physical threats are further divided into three categories. The physical threat is nothing but someone stealing a computer system that has valuable data.

There are two types of threats that are physical and nonphysical. An ethical hacker needs to deal with a bunch of security threats on a regular basis. Any type of risk that has the potential to damage the system or organizations as a whole is called a security threat.
