Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Hacking Presentation

952 views

Published on

Slide Share Presentation on Hacking.

  • Be the first to comment

  • Be the first to like this

Hacking Presentation

  1. 1. 1. What is hacking? 2. Types of Hackers 3. Difference between Hackers and Crackers 4. Criminological theories 5. Academic Studies
  2. 2. • Definition: A hacker or hackers are commonly known as someone who seeks to exploit weaknesses within a computer system or network. Hackers can be associated as a community that works together to attack a computer or network. Short Definition: To gain access to (a computer file or network) illegally or without authorization. (The Free Dictionary, 2013)
  3. 3. Look at the word cloud below and see if you can identify any meanings towards the words. Towards the end of topic 1 the words cloud will help you to associate meanings and theories to these words.
  4. 4. • The definition of a hacker has been in a long strand of controversy about what a true hacker definitions really is and why an individual or community decide to attack specific organisations. “Despite, decades of computer security research, billions spent on secure operations, and growing training requirements, we seem incapable of operating computer securely.” („The Cybersecurity Risk‟, 2012).
  5. 5. A hacker has to understand computers to an advanced level. However, it is important to note that there are two types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a weaknesses within their computer network. Or • A unethical hacker hacks into a system to steal or view information on purpose. To understand more about Hackers and the various types Please watch the go animate Videos called “Groups of Hackers”.
  6. 6. Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1 http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu m=linkshare&utm_campaign=usercontent Hackers Hat (White) – GoAnimate Scene 2 http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc ontent Hackers Hat (Grey) – GoAnimate Scene 3 http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi um=linkshare&utm_campaign=usercontent
  7. 7. The title hacker is given to anyone breaking into a computer. However, professional in the industry argue that there should be two terms hackers and crackers. Computer criminals are often seen as committing a cybercrime through breaking into someone's computer or computer network known as committing a criminal offence commonly known as – „Black Hat‟. These types of people should be called CRACKERS! Instead of someone known as a computer security expert – „White Hat‟. These types of people should be called HACKERS!
  8. 8. Below is some criminological theories presented in hackers research. Please take note of some of these theories and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become Computer Hackers'
  9. 9. Below is some academic studies presented on hackers research. Please take note of some of these studies and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
  10. 10. When each section of the material has been read please take time out and go back onto the Moodle course and locate the link called „Topic 1 – Hackers Journal‟ . Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778 Please write down what you have learnt from this PowerPoint and continue to reflect back on your journal every time a material has been read in Moodle. This will ultimately help you to complete your assessment at the end of the course. Thank You
  11. 11. Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press. Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier. GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013). Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press. Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political science. London: Yale university Press. Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013). Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological Review 22 (6), pp. 664–670, JSTOR. Available at: http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November 2013). The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27 November 2013). Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87 497819 (Accessed: 27 November 2013).

×