SlideShare a Scribd company logo
1 of 6
Why people hack depends on what they're trying to accomplish. Obviously, a criminal hacker is
out to steal financial information or someone's identity. This can be done by breaching security
systems of a company's database or with viruses. These aren't the only hackers out there
though. In recent years, people have been discussing "ethical" hackers. Many people have a
problem believing that any type of hacking could ever be a good thing. Still, there are hackers
that find problems and report them. The term hacker, always gives an about someone using
computer to commit crimes. What need to realize though is that some hackers hack for a good
reason. There are hackers that spend their time trying to find weak spots in software. They
don't do this in order to hack other's machines. They find the loopholes in the system and find
ways to fill them for future security. Without this type of hacking, there would be many more
crime-related hacking cases than there currently are.
Hackers can be divided
into three groups:
• White Hats
• Black Hats
• Grey hats.
WHITE HATS
White hats are the good guys, the ethical
hackers who use their hacking skills for
defensive purposes. Sometimes they’re former
grey hats who have become security
professionals and who use this knowledge to
locate weaknesses and implement counter
measures.
BLACK HATS are the bad guys, the malicious hackers
or crackers who use their skills for illegal or
malicious purposes. They break into or otherwise
violate the system integrity of remote machines,
with malicious intent having gained unauthorized
access. Black hat hackers destroy vital data, deny
leg mate user’s services, and basically cause
problems for their targets. Black hat hackers and
crackers can easily be differentiated from white
head hackers because their actions are malicious.
GREY HATS hackers may work offensively or defensibly depending on the
situation. This is the dividing line between hackers and crackers. Both
are powerful forces on the internet and both will remain permanently.
And some individuals qualify for both categories. The existence of such
individuals further clouds the division between these two groups of
people. In addition to these groups, there are self- proclaimed ethical
hackers, who are interested in hacker tools mostly from a curiosity stand
point. They may want to highlight the security problem in a system or
educate victims so they secure their systems properly. These hackers are
doing their “victims” a favour.
Difference Between Hacking & Cracking
The main difference is that a hacker mostly called as
a person who attack a computer but don't do any damage
or harm but a cracker is a person who do the same thing
as hackers in the first place but the difference is in the
second part which makes them separate, cracker DO case
the damage and harms to individuals and public website
and computers but the cyber law points of view both of
them consider as a crime due to the computer crime Act
1997.

More Related Content

What's hot

social engineering
 social engineering social engineering
social engineeringRavi Patel
 
Ethical hacking composed
Ethical hacking composedEthical hacking composed
Ethical hacking composedBikalpa Thapa
 
What is social engineering & why it is important
What is social engineering & why it is importantWhat is social engineering & why it is important
What is social engineering & why it is importantVikram Khanna
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
How Do Social Media Accounts Get Hacked ?
How Do Social Media Accounts Get Hacked ?How Do Social Media Accounts Get Hacked ?
How Do Social Media Accounts Get Hacked ?HusseinMuhaisen
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering TechniquesNeelu Tripathy
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 

What's hot (20)

social engineering
 social engineering social engineering
social engineering
 
Ethical hacking composed
Ethical hacking composedEthical hacking composed
Ethical hacking composed
 
What is social engineering & why it is important
What is social engineering & why it is importantWhat is social engineering & why it is important
What is social engineering & why it is important
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Hackers final
Hackers finalHackers final
Hackers final
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Social engineering
Social engineering Social engineering
Social engineering
 
How Do Social Media Accounts Get Hacked ?
How Do Social Media Accounts Get Hacked ?How Do Social Media Accounts Get Hacked ?
How Do Social Media Accounts Get Hacked ?
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering Techniques
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 

Viewers also liked

Akaun Hasil dan Belanja KHB T2
Akaun Hasil dan Belanja KHB T2Akaun Hasil dan Belanja KHB T2
Akaun Hasil dan Belanja KHB T2Cikgu Syam
 
Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2
Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2
Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2Cikgu Syam
 
Soal selidik PBS
Soal selidik PBS Soal selidik PBS
Soal selidik PBS Cikgu Syam
 
Bantuan perniagaan KHB
Bantuan perniagaan KHBBantuan perniagaan KHB
Bantuan perniagaan KHBCikgu Syam
 
Transformación Ágil con Agile Kaizen y Lego Star Wars
Transformación Ágil con Agile Kaizen y Lego Star WarsTransformación Ágil con Agile Kaizen y Lego Star Wars
Transformación Ágil con Agile Kaizen y Lego Star WarsXimena Higuera Moriones
 
Sarajevo Ruby Meetup - Why rails is so hard
Sarajevo Ruby Meetup - Why rails is so hardSarajevo Ruby Meetup - Why rails is so hard
Sarajevo Ruby Meetup - Why rails is so hardsamir1983
 
Gmlp pd modules_intro+mod1-sgmt3
Gmlp pd modules_intro+mod1-sgmt3Gmlp pd modules_intro+mod1-sgmt3
Gmlp pd modules_intro+mod1-sgmt3joystani
 
C:\fakepath\gmlp pd modules_intro+mod1-sgmt3
C:\fakepath\gmlp pd modules_intro+mod1-sgmt3C:\fakepath\gmlp pd modules_intro+mod1-sgmt3
C:\fakepath\gmlp pd modules_intro+mod1-sgmt3joystani
 
Bank marketing mix_new_stretegy_in_today_-libre
Bank marketing mix_new_stretegy_in_today_-libreBank marketing mix_new_stretegy_in_today_-libre
Bank marketing mix_new_stretegy_in_today_-libreabin varghese
 
Polio Eradication update
Polio Eradication updatePolio Eradication update
Polio Eradication updateGreg Landry
 
Gmlp pd modules_intro+mod1.2003
Gmlp pd modules_intro+mod1.2003Gmlp pd modules_intro+mod1.2003
Gmlp pd modules_intro+mod1.2003joystani
 
Tool box for Authentic Assessment
Tool box for Authentic AssessmentTool box for Authentic Assessment
Tool box for Authentic AssessmentRachel Martin
 
Estados de shock
Estados de shockEstados de shock
Estados de shockdrmelgar
 
Derrame pleural
Derrame pleuralDerrame pleural
Derrame pleuraldrmelgar
 
Trombosis Venosa Cerebral
Trombosis Venosa CerebralTrombosis Venosa Cerebral
Trombosis Venosa Cerebraldrmelgar
 
Initiation au monde du digital marketing
Initiation au monde du digital marketingInitiation au monde du digital marketing
Initiation au monde du digital marketingFarah Zéga
 

Viewers also liked (19)

Akaun Hasil dan Belanja KHB T2
Akaun Hasil dan Belanja KHB T2Akaun Hasil dan Belanja KHB T2
Akaun Hasil dan Belanja KHB T2
 
Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2
Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2
Aset Liabiliti Ekuiti Pemilik Hasil Belanja KHB T2
 
Soal selidik PBS
Soal selidik PBS Soal selidik PBS
Soal selidik PBS
 
Bantuan perniagaan KHB
Bantuan perniagaan KHBBantuan perniagaan KHB
Bantuan perniagaan KHB
 
Transformación Ágil con Agile Kaizen y Lego Star Wars
Transformación Ágil con Agile Kaizen y Lego Star WarsTransformación Ágil con Agile Kaizen y Lego Star Wars
Transformación Ágil con Agile Kaizen y Lego Star Wars
 
Sarajevo Ruby Meetup - Why rails is so hard
Sarajevo Ruby Meetup - Why rails is so hardSarajevo Ruby Meetup - Why rails is so hard
Sarajevo Ruby Meetup - Why rails is so hard
 
Gmlp pd modules_intro+mod1-sgmt3
Gmlp pd modules_intro+mod1-sgmt3Gmlp pd modules_intro+mod1-sgmt3
Gmlp pd modules_intro+mod1-sgmt3
 
C:\fakepath\gmlp pd modules_intro+mod1-sgmt3
C:\fakepath\gmlp pd modules_intro+mod1-sgmt3C:\fakepath\gmlp pd modules_intro+mod1-sgmt3
C:\fakepath\gmlp pd modules_intro+mod1-sgmt3
 
Bank marketing mix_new_stretegy_in_today_-libre
Bank marketing mix_new_stretegy_in_today_-libreBank marketing mix_new_stretegy_in_today_-libre
Bank marketing mix_new_stretegy_in_today_-libre
 
Polio Eradication update
Polio Eradication updatePolio Eradication update
Polio Eradication update
 
Gmlp pd modules_intro+mod1.2003
Gmlp pd modules_intro+mod1.2003Gmlp pd modules_intro+mod1.2003
Gmlp pd modules_intro+mod1.2003
 
Polio update
Polio updatePolio update
Polio update
 
Tool box for Authentic Assessment
Tool box for Authentic AssessmentTool box for Authentic Assessment
Tool box for Authentic Assessment
 
Ácidos Nucléicos
Ácidos NucléicosÁcidos Nucléicos
Ácidos Nucléicos
 
Ad history
Ad historyAd history
Ad history
 
Estados de shock
Estados de shockEstados de shock
Estados de shock
 
Derrame pleural
Derrame pleuralDerrame pleural
Derrame pleural
 
Trombosis Venosa Cerebral
Trombosis Venosa CerebralTrombosis Venosa Cerebral
Trombosis Venosa Cerebral
 
Initiation au monde du digital marketing
Initiation au monde du digital marketingInitiation au monde du digital marketing
Initiation au monde du digital marketing
 

Similar to Hack and Crack Slide

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking pptfuckubitches
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptxAlefya1
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 

Similar to Hack and Crack Slide (20)

Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Hackers
HackersHackers
Hackers
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Hack and Crack Slide

  • 1. Why people hack depends on what they're trying to accomplish. Obviously, a criminal hacker is out to steal financial information or someone's identity. This can be done by breaching security systems of a company's database or with viruses. These aren't the only hackers out there though. In recent years, people have been discussing "ethical" hackers. Many people have a problem believing that any type of hacking could ever be a good thing. Still, there are hackers that find problems and report them. The term hacker, always gives an about someone using computer to commit crimes. What need to realize though is that some hackers hack for a good reason. There are hackers that spend their time trying to find weak spots in software. They don't do this in order to hack other's machines. They find the loopholes in the system and find ways to fill them for future security. Without this type of hacking, there would be many more crime-related hacking cases than there currently are.
  • 2. Hackers can be divided into three groups: • White Hats • Black Hats • Grey hats.
  • 3. WHITE HATS White hats are the good guys, the ethical hackers who use their hacking skills for defensive purposes. Sometimes they’re former grey hats who have become security professionals and who use this knowledge to locate weaknesses and implement counter measures.
  • 4. BLACK HATS are the bad guys, the malicious hackers or crackers who use their skills for illegal or malicious purposes. They break into or otherwise violate the system integrity of remote machines, with malicious intent having gained unauthorized access. Black hat hackers destroy vital data, deny leg mate user’s services, and basically cause problems for their targets. Black hat hackers and crackers can easily be differentiated from white head hackers because their actions are malicious.
  • 5. GREY HATS hackers may work offensively or defensibly depending on the situation. This is the dividing line between hackers and crackers. Both are powerful forces on the internet and both will remain permanently. And some individuals qualify for both categories. The existence of such individuals further clouds the division between these two groups of people. In addition to these groups, there are self- proclaimed ethical hackers, who are interested in hacker tools mostly from a curiosity stand point. They may want to highlight the security problem in a system or educate victims so they secure their systems properly. These hackers are doing their “victims” a favour.
  • 6. Difference Between Hacking & Cracking The main difference is that a hacker mostly called as a person who attack a computer but don't do any damage or harm but a cracker is a person who do the same thing as hackers in the first place but the difference is in the second part which makes them separate, cracker DO case the damage and harms to individuals and public website and computers but the cyber law points of view both of them consider as a crime due to the computer crime Act 1997.