SlideShare a Scribd company logo
1 of 19
Download to read offline
HACKER
HACKER
Group Members
Index
• Abstract (1)
• Introduction (2)
• Problem Statement (3)
• Objective (4)
• Literature Review (5)
• Hacking (6)
• Hacker (7)
• Types of Hackers (8)
• Black Hat Hacker (9)
• White Hat Hacker (10)
• Black Hat Hacker vs White Hat
Hacker (11)
• Conclusion (12)
• References (13)
• Thank you (14)
• Any Question (15)
• Video Link (16)
Abstract
➢Cyberspace hacker or black hat hacker has led to new cyber
crimes such as exploitation of computer system vulnerabilities. In
an effort to mitigate this phenomenon, companies have hired
security professionals with similar skills as malicious hackers to
keep their information safe. So this presentation is an attempt to
discuss Black Hat andWhite Hat Hackers.
1
Introduction
➢Today the modern society reliance on the network technology which give
benefits of collaboration to organizations and individuals.
➢This change also lead us to the new cybercrime (Hacking).
➢To mitigate these issues or to make system secure company professional
hire ethical hacker also known as white hat hacker.
➢So in this presentation we will discuss about the role and positions of
white hat hacker and black hat hacker.
2
Problem Statement
➢Hacking is an exploitation of vulnerability and follows a series of
well-defined actions that make it a process (EC-Council, 2018).
➢White Hat and Black Hat hackers share an almost common hacking
process and skills. One hacker exploit system vulnerabilities to
damage the system or the another one is to resolve the problem.
➢So, it is essential to understand those ethical values are in relation to
back hats and white hat hackers.
3
Objectives
➢To know about hackers and ethical values
➢Role of hackers
➢Black hat and white hat hacker roles and positions
4
Literature Review
➢Company information has been compromised due to security
threats and hacking. With the recent rise of security breaches, many
companies have tried to mislead the hacking incident by hiring
security professionals with similar skills to hackers to ensure that
their infrastructure is safe and that they are ready for threats.
5
Hacking
➢The term hacking means Stole someone information.
➢Hacking or access someone information without there permission is
illegal and it is a crime.
➢To gain access on someone pc or there data by exploiting the
vulnerabilities is known as hacking (sharma, 2008).
6
Hacker
➢The term "hacker" was first used to refer to the best and radical
programmers in the field of computer science (Sharma, 2008).
➢Hack refers to "innovation, style and technical features“
(madarie,n.d).
➢Highly skilled person who can gain authorized or unautherized
access on some other computers or private data (Techterm, 2013).
7
Type of Hacker
8
BLACK HAT HACKER
WHITE HAT HACKER
GREY HAT HACKER
Black Hat Hacker
➢Also known as Cracker.
➢Involve in bad or illegal activities.
➢Do malicious work.
➢Exploit System vulnerabilities to harm other.
➢Trying to harm system and stole useful information.
9
White Hat Hacker
10
➢Also known as Ethical hacker.
➢Penetrate testing and help the organization to secure there system.
➢Follow legal and permission based procedure.
➢Exploit System vulnerabilities to help the organization.
➢Trying to secure system from security threats.
Black Hat Hacker vs White Hat Hacker
Black Hat White Hat
Known as Cracker. Known as Ethical hacker.
Do Illegal and malicious work. Do Legal work.
Damage system and stole data.
protect and help organization to
secure there data.
Exploit System to do malicious
work and own sole purpose.
Exploit System to help other and
protect from threats.
11
Conclusion
➢Hacking has both illegal and legal aspects. Unauthorized access and
use or personal information or computer resources are part of illegal
hacking. Where as legal or ethical aspect has legal limitations and
there is no charge to press. This is being morally and legally justified.
These are the common factor between Black Hat Hacker and White
Hat Hacker.
12
Citation and References
➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited.
➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological
Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446
➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of
MotivationalTypes of Values in a Sample of Hackers Under a Creative
Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC
BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International
Journal of Cyber Criminology, 11(1), 973–5089.
https://doi.org/10.5281/zenodo.495773
➢Link of Research paper =
https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat
_-_The_thin_line_of_ethicsedited
13
Thank you
14
Any Question?
15
Video Link
➢Google Drive
https://drive.google.com/file/d/1ITTWaw3qtn0R0h1hFah
J5dHegkOm-aZn/view?usp=sharing
16

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 

What's hot (20)

Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Application Security
Application SecurityApplication Security
Application Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Web Security
Web SecurityWeb Security
Web Security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Similar to White hat and black hat hackers

Similar to White hat and black hat hackers (20)

Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
ethics final project
ethics final projectethics final project
ethics final project
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
ACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptxACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hackers
HackersHackers
Hackers
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

White hat and black hat hackers

  • 3. Index • Abstract (1) • Introduction (2) • Problem Statement (3) • Objective (4) • Literature Review (5) • Hacking (6) • Hacker (7) • Types of Hackers (8) • Black Hat Hacker (9) • White Hat Hacker (10) • Black Hat Hacker vs White Hat Hacker (11) • Conclusion (12) • References (13) • Thank you (14) • Any Question (15) • Video Link (16)
  • 4. Abstract ➢Cyberspace hacker or black hat hacker has led to new cyber crimes such as exploitation of computer system vulnerabilities. In an effort to mitigate this phenomenon, companies have hired security professionals with similar skills as malicious hackers to keep their information safe. So this presentation is an attempt to discuss Black Hat andWhite Hat Hackers. 1
  • 5. Introduction ➢Today the modern society reliance on the network technology which give benefits of collaboration to organizations and individuals. ➢This change also lead us to the new cybercrime (Hacking). ➢To mitigate these issues or to make system secure company professional hire ethical hacker also known as white hat hacker. ➢So in this presentation we will discuss about the role and positions of white hat hacker and black hat hacker. 2
  • 6. Problem Statement ➢Hacking is an exploitation of vulnerability and follows a series of well-defined actions that make it a process (EC-Council, 2018). ➢White Hat and Black Hat hackers share an almost common hacking process and skills. One hacker exploit system vulnerabilities to damage the system or the another one is to resolve the problem. ➢So, it is essential to understand those ethical values are in relation to back hats and white hat hackers. 3
  • 7. Objectives ➢To know about hackers and ethical values ➢Role of hackers ➢Black hat and white hat hacker roles and positions 4
  • 8. Literature Review ➢Company information has been compromised due to security threats and hacking. With the recent rise of security breaches, many companies have tried to mislead the hacking incident by hiring security professionals with similar skills to hackers to ensure that their infrastructure is safe and that they are ready for threats. 5
  • 9. Hacking ➢The term hacking means Stole someone information. ➢Hacking or access someone information without there permission is illegal and it is a crime. ➢To gain access on someone pc or there data by exploiting the vulnerabilities is known as hacking (sharma, 2008). 6
  • 10. Hacker ➢The term "hacker" was first used to refer to the best and radical programmers in the field of computer science (Sharma, 2008). ➢Hack refers to "innovation, style and technical features“ (madarie,n.d). ➢Highly skilled person who can gain authorized or unautherized access on some other computers or private data (Techterm, 2013). 7
  • 11. Type of Hacker 8 BLACK HAT HACKER WHITE HAT HACKER GREY HAT HACKER
  • 12. Black Hat Hacker ➢Also known as Cracker. ➢Involve in bad or illegal activities. ➢Do malicious work. ➢Exploit System vulnerabilities to harm other. ➢Trying to harm system and stole useful information. 9
  • 13. White Hat Hacker 10 ➢Also known as Ethical hacker. ➢Penetrate testing and help the organization to secure there system. ➢Follow legal and permission based procedure. ➢Exploit System vulnerabilities to help the organization. ➢Trying to secure system from security threats.
  • 14. Black Hat Hacker vs White Hat Hacker Black Hat White Hat Known as Cracker. Known as Ethical hacker. Do Illegal and malicious work. Do Legal work. Damage system and stole data. protect and help organization to secure there data. Exploit System to do malicious work and own sole purpose. Exploit System to help other and protect from threats. 11
  • 15. Conclusion ➢Hacking has both illegal and legal aspects. Unauthorized access and use or personal information or computer resources are part of illegal hacking. Where as legal or ethical aspect has legal limitations and there is no charge to press. This is being morally and legally justified. These are the common factor between Black Hat Hacker and White Hat Hacker. 12
  • 16. Citation and References ➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited. ➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446 ➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of MotivationalTypes of Values in a Sample of Hackers Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International Journal of Cyber Criminology, 11(1), 973–5089. https://doi.org/10.5281/zenodo.495773 ➢Link of Research paper = https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat _-_The_thin_line_of_ethicsedited 13