In this video we will try to explain the hackers and there basic difference and approach of different type of hackers. If you Interested to view the video then link of video or other documents below
➤YouTube Video:
↻ https://youtu.be/BHvzR2JkFvE
➤Research paper we follow:
↻ https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat_-_The_thin_line_of_ethicsedited
➤Self Research paper:
↻ https://drive.google.com/file/d/14PbVExgT90zi_9UuublQWi2Yg7JcWdE3/view?usp=sharing
-----------------------------------------------------------------------------
************
Contact Me
************
https://www.youtube.com/bilalteach
bilalteach111@gmail.com
#bilalteach
*************************************************************************************
Different type of hackers
3. Index
• Abstract (1)
• Introduction (2)
• Problem Statement (3)
• Objective (4)
• Literature Review (5)
• Hacking (6)
• Hacker (7)
• Types of Hackers (8)
• Black Hat Hacker (9)
• White Hat Hacker (10)
• Black Hat Hacker vs White Hat
Hacker (11)
• Conclusion (12)
• References (13)
• Thank you (14)
• Any Question (15)
• Video Link (16)
4. Abstract
➢Cyberspace hacker or black hat hacker has led to new cyber
crimes such as exploitation of computer system vulnerabilities. In
an effort to mitigate this phenomenon, companies have hired
security professionals with similar skills as malicious hackers to
keep their information safe. So this presentation is an attempt to
discuss Black Hat andWhite Hat Hackers.
1
5. Introduction
➢Today the modern society reliance on the network technology which give
benefits of collaboration to organizations and individuals.
➢This change also lead us to the new cybercrime (Hacking).
➢To mitigate these issues or to make system secure company professional
hire ethical hacker also known as white hat hacker.
➢So in this presentation we will discuss about the role and positions of
white hat hacker and black hat hacker.
2
6. Problem Statement
➢Hacking is an exploitation of vulnerability and follows a series of
well-defined actions that make it a process (EC-Council, 2018).
➢White Hat and Black Hat hackers share an almost common hacking
process and skills. One hacker exploit system vulnerabilities to
damage the system or the another one is to resolve the problem.
➢So, it is essential to understand those ethical values are in relation to
back hats and white hat hackers.
3
7. Objectives
➢To know about hackers and ethical values
➢Role of hackers
➢Black hat and white hat hacker roles and positions
4
8. Literature Review
➢Company information has been compromised due to security
threats and hacking. With the recent rise of security breaches, many
companies have tried to mislead the hacking incident by hiring
security professionals with similar skills to hackers to ensure that
their infrastructure is safe and that they are ready for threats.
5
9. Hacking
➢The term hacking means Stole someone information.
➢Hacking or access someone information without there permission is
illegal and it is a crime.
➢To gain access on someone pc or there data by exploiting the
vulnerabilities is known as hacking (sharma, 2008).
6
10. Hacker
➢The term "hacker" was first used to refer to the best and radical
programmers in the field of computer science (Sharma, 2008).
➢Hack refers to "innovation, style and technical features“
(madarie,n.d).
➢Highly skilled person who can gain authorized or unautherized
access on some other computers or private data (Techterm, 2013).
7
12. Black Hat Hacker
➢Also known as Cracker.
➢Involve in bad or illegal activities.
➢Do malicious work.
➢Exploit System vulnerabilities to harm other.
➢Trying to harm system and stole useful information.
9
13. White Hat Hacker
10
➢Also known as Ethical hacker.
➢Penetrate testing and help the organization to secure there system.
➢Follow legal and permission based procedure.
➢Exploit System vulnerabilities to help the organization.
➢Trying to secure system from security threats.
14. Black Hat Hacker vs White Hat Hacker
Black Hat White Hat
Known as Cracker. Known as Ethical hacker.
Do Illegal and malicious work. Do Legal work.
Damage system and stole data.
protect and help organization to
secure there data.
Exploit System to do malicious
work and own sole purpose.
Exploit System to help other and
protect from threats.
11
15. Conclusion
➢Hacking has both illegal and legal aspects. Unauthorized access and
use or personal information or computer resources are part of illegal
hacking. Where as legal or ethical aspect has legal limitations and
there is no charge to press. This is being morally and legally justified.
These are the common factor between Black Hat Hacker and White
Hat Hacker.
12
16. Citation and References
➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited.
➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological
Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446
➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of
MotivationalTypes of Values in a Sample of Hackers Under a Creative
Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC
BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International
Journal of Cyber Criminology, 11(1), 973–5089.
https://doi.org/10.5281/zenodo.495773
➢Link of Research paper =
https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat
_-_The_thin_line_of_ethicsedited
13