0% found this document useful (0 votes)
21 views7 pages

Cybersecurity

The document provides an overview of cybersecurity concepts, defining Trojan Horses, malware, and viruses, along with real-world examples of each. It also differentiates between various types of hackers, including white hat, black hat, grey hat, script kiddies, hacktivists, blue hat, red hat, and green hat hackers, outlining their motivations and methods. Each hacker type is illustrated with examples to highlight their roles and impacts in the digital world.

Uploaded by

vhabna.deb174
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Cybersecurity

The document provides an overview of cybersecurity concepts, defining Trojan Horses, malware, and viruses, along with real-world examples of each. It also differentiates between various types of hackers, including white hat, black hat, grey hat, script kiddies, hacktivists, blue hat, red hat, and green hat hackers, outlining their motivations and methods. Each hacker type is illustrated with examples to highlight their roles and impacts in the digital world.

Uploaded by

vhabna.deb174
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Name: DHRUBO DEBNATH

Stream: BCA
Sem: 6th
Paper Name: Cyber Security
Paper Code: BCAC602
College roll: 10422148
University Roll: 30601222131
College: Narula Institute of Technology
1. Define Trojan Horse, Malware and Virus with
example.

Trojan Horse:
The term “Trojan Horse” comes from the ancient Greek myth
where Greek soldiers hid inside a large wooden horse to enter the city of Troy
unnoticed — and then attacked from within. In the world of cybersecurity, a
Trojan works the same way.
A Trojan Horse is a type of malware that pretends to be a legitimate or useful
program but actually contains harmful code. Trojans don’t replicate themselves
like viruses, but they open the door for other attacks. Once you install a Trojan,
it can do a variety of harmful things like:
 Stealing personal data (passwords, credit card information)
 Spying on your activities (via keyloggers or screen captures)
 Creating a backdoor for hackers to take remote control of your device
 Downloading more malware without your knowledge
Real-world Example:
Let’s say you get an email claiming you’ve won a prize, and it asks you to
download a file called “Prize_Claim_Form.exe.” Thinking it’s legitimate, you
download and open the file — but nothing happens. What’s actually happened
is a Trojan has installed itself in the background and started logging your
keystrokes, capturing your usernames and passwords.

Malware:
Malware (short for “malicious software”) is a general category that
includes all types of harmful software designed to damage, disrupt, or take
unauthorized control of a device, network, or data. It’s like an umbrella term
that covers:
 Viruses
 Trojans
 Worms
 Ransomware
 Spyware
 Adware
Types of malware:
 Ransomware: Encrypts your files and demands a ransom for their
release.
 Spyware: Secretly monitors your activities and gathers information
without your consent.
 Worms: Self-replicating malware that spreads across networks without
human action.
 Adware: Displays unwanted ads, often collecting data without consent.
Real-world Example:
You download a free video editing tool from an unofficial website. While the
software works, it also installs adware that floods your screen with pop-up ads
and tracks your browsing habits.

Virus:
A computer virus is a type of malware that attaches itself to a legitimate file or
program and spreads when the infected file is executed. Much like a biological virus, it needs
a “host” (like a document or program) to survive and spread.
Viruses often:
 Corrupt or delete data
 Slow down your system
 Spread to other files and devices via emails, USB drives, or shared networks
 Cause unexpected behavior like frequent crashes or strange error messages
Real-world Example:
Imagine you receive a Word document in an email from what looks like a trusted colleague.
You open the document, and a hidden virus activates — starting to corrupt files on your
computer and spreading to every other document you open.

2. Differentiate between different


types of hackers?
Hackers are often portrayed as cybercriminals in movies and media, but the
reality is more complex. Hacking itself is just the act of finding weaknesses in
computer systems or networks — and not all hackers do this with bad
intentions. Let’s explore the different types of hackers, their motivations,
methods, and how they impact the digital world.

1. White Hat Hackers (Ethical Hackers):


White hat hackers are the "good guys" of the cybersecurity world. They use
their skills legally and ethically to help protect systems from cyber threats.
Companies often hire white hat hackers to conduct penetration testing (pen
testing) — simulated cyberattacks designed to identify vulnerabilities before
real hackers exploit them.
 Motivation: Protect systems, prevent data breaches, and improve
security.
 Methods:
o Penetration testing
o Security audits
o Vulnerability assessments
 Example: A cybersecurity expert is hired by a bank to try hacking their
system. If the hacker finds a vulnerability, they report it so it can be fixed
before real criminals exploit it.
 Famous White Hat: Kevin Mitnick — once a black hat hacker, he turned
his life around and became a well-respected cybersecurity consultant.

2. Black Hat Hackers (Malicious Hackers):


Black hat hackers are the "bad guys" — they break into systems without
permission, often for personal gain, destruction, or chaos. Their attacks can
lead to data theft, financial loss, disruption of services, and reputational
damage.
 Motivation: Money, revenge, fame, or political reasons.
 Methods:
o Phishing (tricking users into giving up passwords)
o Ransomware (encrypting data and demanding a ransom)
o DDoS attacks (overloading servers to crash websites)
 Example: A hacker breaks into a hospital’s network and steals patient
data to sell on the dark web.
 Famous Black Hat: Adrian Lamo — hacked into systems like Microsoft
and Yahoo, but later helped the FBI track down whistleblower Chelsea
Manning.

3. Grey Hat Hackers:


Grey hat hackers walk a fine line between right and wrong. They don’t have
malicious intent, but they hack without permission, often just to test their
skills or draw attention to security issues. Sometimes, they report
vulnerabilities, but they may also ask for money to fix them — which makes
their behavior questionable.
 Motivation: Curiosity, recognition, or financial reward.
 Methods:
o Scanning systems for vulnerabilities without permission
o Exposing security flaws publicly
o Occasionally demanding a "bug bounty" fee for their findings
 Example: A hacker finds a security hole in a company’s website and
informs them — but asks for a fee to fix it.
 Famous Grey Hat: Marcus Hutchins — stopped the WannaCry
ransomware attack in 2017 but had a controversial history of creating
malware in his younger days.
4. Script Kiddies:
Script kiddies are inexperienced hackers who use ready-made tools and scripts
developed by others. They often have limited technical knowledge and don’t
understand the full impact of their actions. Their attacks are usually low-level
and disruptive rather than sophisticated.
 Motivation: Fun, attention, or curiosity.
 Methods:
o Using automated hacking tools
o Launching DDoS attacks
o Defacing websites
 Example: A teenager uses a free DDoS tool to take down a gaming server
just for laughs.
 Famous Script Kiddie: None — because they rarely achieve the notoriety
of more skilled hackers.
5. Hacktivists:
Hacktivists combine hacking with activism — using their skills to promote
political, social, or ideological causes. Their actions often target governments,
corporations, or institutions they see as corrupt or unjust.
 Motivation: Political or social justice, activism, protest.
 Methods:
o Defacing websites with political messages
o Leaking confidential documents (whistleblowing)
o Disrupting services to draw attention to causes
 Example: A hacktivist group takes down a government website to protest
internet censorship.
 Famous Hacktivist Group: Anonymous — known for cyberattacks on
governments and corporations for causes like free speech and anti-
censorship.
6. Blue Hat Hackers:
Blue hat hackers are often motivated by revenge or personal grievances.
Unlike white hats and black hats, blue hats usually aren't professional hackers
— they might learn hacking techniques for a specific attack against someone
they feel wronged them.
 Motivation: Revenge, personal vendettas.
 Methods:
o Spreading viruses
o Launching personal attacks (like doxing or stalking)
o Defacing websites or social media accounts
 Example: A disgruntled ex-employee hacks their former employer’s
system out of spite.

7. Red Hat Hackers:


Red hat hackers are like cyber vigilantes. They fight black hat hackers — but
sometimes use aggressive or illegal methods to do so. They’re more offensive
than white hats, often destroying black hat systems rather than just defending
against them.
 Motivation: Stopping cybercrime.
 Methods:
o Hacking black hat infrastructure
o Deploying malware against malicious actors
o Taking down illegal websites
 Example: A red hat hacker tracks down a ransomware gang and wipes
their servers.

8. Green Hat Hackers:


Green hat hackers are new to hacking — they’re eager learners who want to
become skilled but lack experience. They often experiment and sometimes
cross ethical lines without fully understanding the consequences.
 Motivation: Learning, curiosity.
 Methods:
o Watching hacking tutorials online
o Using simple hacking tools
o Experimenting with small-scale attacks
 Example: A beginner tries SQL injection on a website just to see if it
works.

You might also like