8 17 2023 - Terminologies in Cyber Security
8 17 2023 - Terminologies in Cyber Security
Vulnerability
Some basic
Terminologies Payload
Exploit
Vulnerability
• A vulnerability refers to a weakness or flaw in a system,
software, or network that can be exploited by an attacker to
compromise its integrity, confidentiality, or availability.
• For Ex:
• Let's say you have a social media app on your
smartphone that allows you to upload profile pictures.
If there is a vulnerability in the app that allows users to
upload malicious files instead of regular images, it
could potentially lead to the compromise of the app or
your device.
Exploit
• An exploit is a piece of software, code, or technique that takes
advantage of a vulnerability to carry out an attack. Exploits are
specifically designed to target and leverage the weaknesses or flaws
in a system or software.
• For example, the exploit might involve manipulating the app's
image upload functionality by sending a specially crafted image
file that triggers the vulnerability, allowing the attacker to
execute their payload.
Payload
• A payload refers to the code or set of instructions that
an attacker delivers to a target system after exploiting
a vulnerability.
• For instance, the payload could be designed to
gain unauthorized access to your personal data
stored on the device or even control your device
remotely.
Virus
Cybercriminals use spyware to monitor the activities of users. By Much like other malware, antivirus software can help you detect and
logging the keystrokes, a user inputs throughout the day, the malware eliminate spyware. You can also use anti-tracking browser extensions
can provide access to usernames, passwords, and personal data. to keep spyware from following your users from site to site.
Rootkit Malware