SlideShare a Scribd company logo
1 of 12
Outlines:
- Disagreement on the definition of a hacker.
- Classification of hacker morally.
- Hacker attack methods.
- Methods for collecting information.
- The black hat hackers.
- The White hat hackers.
- The top ten famous hackers.
Disagreement on the definition of a hacker
  - Many define the hacker as a person who is:
 destructive, negative and bad. These terms are
 combined with the word hacker ( computer hacker).

  - And that the impact of some of what was in the
 media, where due to the lack of understanding
 of reality hacker, and relate it to word piracy.

  - (piracy) : expression that describes the illegal sale of
 copies of the private creative work.

  - and is used in violation of copyright in
 particular for films, television episodes , songs and computer
 programs. Web network has become one of the
 best marketing means.
- Cracker : term to define a spoiler hacker.
    - despite the both marked the intelligence
and spirit of challenge and not afraid to
face the unknown. However, the cracker
always acts of sabotage and intrusion for
reasons other than positive and this is
the person who deserves the label Computer
pirate.
    - While the hacker devise solutions to the
problems and trying to innovate in his work.
Classification of hacker morally

- a white hat hacker: is called hacker reformer.
- a black hat hacker: called
the hacker spoiler, which in English is
called Cracker.
- a Grey hat hacker :tottering between
reform and tampering.
Hacker attack methods

- Denial of service attacks (DoS).
- Overflow the buffer.
- Security holes.
- Trojans (Trojan horse).
Methods for collecting information

- Sniffing (listen).
- Social Engineering.
- finding wireless networks.
The hacker is often a programmer or a network-engineers
or individuals familiar with the very technology and carry
out piracy through the use of specific devices in a few
cases.

  Either the possibility of hacking the real will be one of skill
hacker and intelligence riper, so that it reveals gaps in the
Web sites and programs .

   And is not permanent that the aim is a hacker vandalism
in most cases.

   The goal is to prove the strength and the ability to defeat
the defenses of the site, which means that the hacker was
able to defeat website designers and developers .
The black hat hacker
 - A black hat is the villain or bad guy.
 - The phrase is often used in computing
slang, where it refers to a computer security
hacker who breaks into networks or
computers, or creates computer viruses.
 - Unlike a white hat hacker, the black hat
hacker takes advantage of the break-
in, perhaps destroying files or stealing data for
some future purpose.
- The black hat hacker may also make the
exploit known to other hackers and/or the
public without notifying the victim. This gives
others the opportunity to exploit the
vulnerability before the organization is able to
secure it.
  - The term comes from old Western
movies, where heroes often wore white hats
and the "bad guys" wore black hats.
The white hat hackers
  - A white hat hacker breaks security for non-
malicious reasons, perhaps to test their own
security system. The term "white hat" in
Internet slang refers to an ethical hacker.

 - This classification also includes individuals
who perform penetration tests and
assessments within a contractual agreement.
The top ten famous hackers
1. Kevin Mitnick
2. Gary McKinnon
3. Adrian Lamo
4. Robert Tappan Morris
5. Vladimir Levin
6. Markus Hess
7. Michael Calce
8. Albert Gonzalez
9. Kevin Poulsen
10. Jonathan James

More Related Content

What's hot

Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917Evan Francen
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSteven Hatfield
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 

What's hot (19)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
Hacking
HackingHacking
Hacking
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Hacking
HackingHacking
Hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Chris Gates
 
One Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform ExploitationOne Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform ExploitationQuinn Wilton
 
Javascript Exploitation
Javascript ExploitationJavascript Exploitation
Javascript ExploitationRashid feroz
 
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTUREVULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURENurul Haszeli Ahmad
 
DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesSynack
 
Black Hat Thinking
Black Hat ThinkingBlack Hat Thinking
Black Hat ThinkingFrank Peters
 
Armitage : Art of Exploitation
Armitage : Art of ExploitationArmitage : Art of Exploitation
Armitage : Art of ExploitationKapil Soni
 
Network Exploitation
Network ExploitationNetwork Exploitation
Network ExploitationKHNOG
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
City Branding- Trivandrum and Bilbao
City Branding- Trivandrum and BilbaoCity Branding- Trivandrum and Bilbao
City Branding- Trivandrum and BilbaoWEATHENS
 
Programa Curricular Educacion Primaria
Programa Curricular Educacion PrimariaPrograma Curricular Educacion Primaria
Programa Curricular Educacion PrimariaMilagros Laca
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep WebWendy DeGroat
 

Viewers also liked (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
One Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform ExploitationOne Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform Exploitation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Javascript Exploitation
Javascript ExploitationJavascript Exploitation
Javascript Exploitation
 
Hacking
HackingHacking
Hacking
 
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTUREVULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
 
DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 Devices
 
Black Hat Thinking
Black Hat ThinkingBlack Hat Thinking
Black Hat Thinking
 
Armitage : Art of Exploitation
Armitage : Art of ExploitationArmitage : Art of Exploitation
Armitage : Art of Exploitation
 
Network Exploitation
Network ExploitationNetwork Exploitation
Network Exploitation
 
Deep web
Deep webDeep web
Deep web
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
1088
10881088
1088
 
1. Welcome Note
1. Welcome Note1. Welcome Note
1. Welcome Note
 
City Branding- Trivandrum and Bilbao
City Branding- Trivandrum and BilbaoCity Branding- Trivandrum and Bilbao
City Branding- Trivandrum and Bilbao
 
Programa Curricular Educacion Primaria
Programa Curricular Educacion PrimariaPrograma Curricular Educacion Primaria
Programa Curricular Educacion Primaria
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep Web
 

Similar to Hackers

Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 

Similar to Hackers (20)

Hackers final
Hackers finalHackers final
Hackers final
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Hackers

  • 1.
  • 2. Outlines: - Disagreement on the definition of a hacker. - Classification of hacker morally. - Hacker attack methods. - Methods for collecting information. - The black hat hackers. - The White hat hackers. - The top ten famous hackers.
  • 3. Disagreement on the definition of a hacker - Many define the hacker as a person who is: destructive, negative and bad. These terms are combined with the word hacker ( computer hacker). - And that the impact of some of what was in the media, where due to the lack of understanding of reality hacker, and relate it to word piracy. - (piracy) : expression that describes the illegal sale of copies of the private creative work. - and is used in violation of copyright in particular for films, television episodes , songs and computer programs. Web network has become one of the best marketing means.
  • 4. - Cracker : term to define a spoiler hacker. - despite the both marked the intelligence and spirit of challenge and not afraid to face the unknown. However, the cracker always acts of sabotage and intrusion for reasons other than positive and this is the person who deserves the label Computer pirate. - While the hacker devise solutions to the problems and trying to innovate in his work.
  • 5. Classification of hacker morally - a white hat hacker: is called hacker reformer. - a black hat hacker: called the hacker spoiler, which in English is called Cracker. - a Grey hat hacker :tottering between reform and tampering.
  • 6. Hacker attack methods - Denial of service attacks (DoS). - Overflow the buffer. - Security holes. - Trojans (Trojan horse).
  • 7. Methods for collecting information - Sniffing (listen). - Social Engineering. - finding wireless networks.
  • 8. The hacker is often a programmer or a network-engineers or individuals familiar with the very technology and carry out piracy through the use of specific devices in a few cases. Either the possibility of hacking the real will be one of skill hacker and intelligence riper, so that it reveals gaps in the Web sites and programs . And is not permanent that the aim is a hacker vandalism in most cases. The goal is to prove the strength and the ability to defeat the defenses of the site, which means that the hacker was able to defeat website designers and developers .
  • 9. The black hat hacker - A black hat is the villain or bad guy. - The phrase is often used in computing slang, where it refers to a computer security hacker who breaks into networks or computers, or creates computer viruses. - Unlike a white hat hacker, the black hat hacker takes advantage of the break- in, perhaps destroying files or stealing data for some future purpose.
  • 10. - The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it. - The term comes from old Western movies, where heroes often wore white hats and the "bad guys" wore black hats.
  • 11. The white hat hackers - A white hat hacker breaks security for non- malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an ethical hacker. - This classification also includes individuals who perform penetration tests and assessments within a contractual agreement.
  • 12. The top ten famous hackers 1. Kevin Mitnick 2. Gary McKinnon 3. Adrian Lamo 4. Robert Tappan Morris 5. Vladimir Levin 6. Markus Hess 7. Michael Calce 8. Albert Gonzalez 9. Kevin Poulsen 10. Jonathan James