Sunteți pe pagina 1din 12

Some Software Security

Basics
Avyaan.com

What is Security

Security is what keeps a person or things shielded from threats. This is a simple answer
to the question What is security?. The same is true for software application security
unless a web application or mobile application is secure enough, it is very much likely
to become a target for hackers. The security protocol of these applications thus to be
needs to be highly effective so that any unauthorized access can be avoided.
Avyaan.com

Quick Overview of Hackers

Hackers background
Cyber Harassment
Cyber Bullying
Cyber Crime Statistics
Computer Fraud
Legal Services

Avyaan.com

Types of Hacker

If you are about to deal with hackers for the sake of your apps, you need to know some
facts about them. There are mainly three types of hackers black hat, white hat and grey
hat. While Black hats violate software security for personal profit, White hats stop
them from doing that. Grey hats on the other hand, break the security protocol an app
just for the pleasure of doing so. They might hack a company's web app and then inform
the company about the vulnerabilities in the app.
Avyaan.com

Hacker & Ethical Hacker


Those with a basic idea of software security
are familiar with the term hacker. Others,
however, need a clear definition of the term. A
hacker is a tech-savvy professional who tries to
gain unauthorized access to mobile and web
applications with malicious intent. Hacker and
ethical hacker are similar professionals with
opposite intentions. An ethical hacker applies
his skills to stop hackers from ruining software
applications and accessing the confidential data
they manipulate.

Avyaan.com

History of Hackers

1903- Magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming's
public demonstration of Guglielmo Marconi's purportedly secure wireless
telegraphy technology, sending insulting Morse code messages through the
auditorium's projector.
1932- Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Rycki
broke the Enigma machine code.

Content Source

Avyaan.com

1971- John T. Draper (later nicknamed Captain Crunch), his friend Joe Engressia,
and blue box phone phreaking hit the news with an Esquire Magazine feature
story.

1983- The 414s break into 60 computer systems at institutions ranging from the
Los Alamos National Laboratory to Manhattan's Memorial Sloan-Kettering
Cancer Center. The incident appeared as the cover story of Newsweek with the
title "Beware: Hackers at play". As a result, the U.S. House of Representatives held
hearings on computer security and passed several laws.
Avyaan.com

1986- After more and more break-ins to government and corporate computers,
Congress passes the Computer Fraud and Abuse Act, which makes it a crime to
break into computer systems. The law, however, does not cover juveniles.

Content Source

Avyaan.com

Hacking Process

Avyaan.com

Some Famous Hackers


5 Of The World's Most Famous Hackers
Jonathan
James

Gary
McKinnon

Kevin Poulsen
Kevin
Mitnick

Albert
Gonzalez

Avyaan.com

Adress: A-83, 1st Floor,


Sector-2, Noida, 201301 India
Email Id: sales@avyaan.com
Phone No: +91 0120-6517462
Mobile No: +91 7042001174
Website: http://www.avyaan.com/

Avyaan.com

Avyaan.com

S-ar putea să vă placă și