SlideShare a Scribd company logo
1 of 8
Hacking
Dr Sajeena S.
• Hacking refers to activities that seek to
compromise digital devices, such as
computers, smartphones, tablets, and
even entire networks.
• And while hacking might not always be
for malicious purposes, nowadays most
references to hacking, and hackers,
characterize it/them as unlawful activity
by cybercriminals—motivated by
financial gain, protest, information
gathering (spying), and even just for the
“fun” of the challenge.
• The term “hacker” is popularly associated
with cybercriminals harbouring malicious
intentions, when in reality, it’s a lot more.
• A hacker can be anyone who utilizes their
computer software and hardware knowledge
to break down and bypass a computer,
device, or network’s security measures.
• It’s popularly believed hacking is illegal on
principle, which isn’t the case if a system
owner willingly and knowingly grants
access.
• In fact, many private entities and
government agencies hire hackers to help
maintain their system’s security.
• There are two main factors that determine
what type of hacker an individual is: their
motives and legality of their actions.
Hackers are divided into three types—
white, black, and grey hat, a naming
system that was derived from old western
films, where the protagonists would always
wear white hats and vice versa for villain
characters.
1. Black Hat
• Black hat hackers are normally responsible for
creating malware, which is frequently used to
infiltrate computerized networks and systems.
• They’re usually motivated by personal or financial
gain, but can also participate in espionage, protests,
or merely enjoy the thrill.
• Black hat hackers can be anyone from amateurs to
highly experienced and knowledgeable individuals
looking to spread malware, steal private data, like
login credentials, along with financial and personal
information. Upon accessing their targets and
depending on their motives, black hat hackers can
either steal, manipulate, or destroy system data.
2. White Hat
• Also known as “ethical hackers,” they’re often
employed or contracted by companies and
governmental entities, working as security
specialists looking for vulnerabilities.
• While they employ the same methods as black hat
hackers, they always have permission from the
system’s owner, making their actions completely
legal.
• White hat hackers implement strategies like
penetration tests, monitor in-place security
systems, along with vulnerability assessments.
• Ethical hacking, the term used to describe the
nature of a white hat hackers’ actions, can even be
learned through independent sources, training,
conferences, and certifications.
3. Grey Hat
• As the name suggests, these individuals utilize
aspects from black and white hat hackers, but will
usually seek out vulnerabilities in a system without
an owner’s permission or knowledge.
• While they’ll report any issues they encounter to
the owner, they’ll also request some sort of
compensation or incentive. Should the owner not
respond or reject their proposition, a grey hat
hacker might exploit the newfound flaws.
• Grey hat hackers aren’t malicious by nature, but do
seek to have their efforts rewarded. Since grey hat
hackers don’t have permission to access the system
by its owner, their actions are ultimately considered
illegal, despite any alarming findings they might
reveal.
•THANK YOU

More Related Content

What's hot

Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Cyber Security Awarenessv2.pptx
Cyber Security Awarenessv2.pptxCyber Security Awarenessv2.pptx
Cyber Security Awarenessv2.pptxreagan sapul
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hackingnitish mehta
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Hacking
HackingHacking
Hacking
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Hackers
HackersHackers
Hackers
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Cyber Security Awarenessv2.pptx
Cyber Security Awarenessv2.pptxCyber Security Awarenessv2.pptx
Cyber Security Awarenessv2.pptx
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Hacking
Hacking Hacking
Hacking
 
Internet security
Internet securityInternet security
Internet security
 
185
185185
185
 

Similar to Hacking

Intro
IntroIntro
IntroKalkey
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?Daniel Agudo Garcia
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptxSunipa Bera
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptxambemPrashanthi
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxBhupeshDhapola2
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2Ishaq Shinwari
 

Similar to Hacking (20)

Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 

More from sajeena81

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicssajeena81
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptxsajeena81
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptxsajeena81
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptxsajeena81
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismsajeena81
 
Life span psychology
Life span psychologyLife span psychology
Life span psychologysajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approachsajeena81
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical sciencesajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approachsajeena81
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable developmentsajeena81
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learningsajeena81
 
E content
E contentE content
E contentsajeena81
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical sciencesajeena81
 
Microteaching
MicroteachingMicroteaching
Microteachingsajeena81
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioningsajeena81
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variationsajeena81
 
8. skill of using chalk board
8. skill of using chalk board8. skill of using chalk board
8. skill of using chalk boardsajeena81
 
Microteaching skill of expalining
Microteaching  skill of expaliningMicroteaching  skill of expalining
Microteaching skill of expaliningsajeena81
 
Computer mediated communication (cmc)
Computer mediated communication (cmc)Computer mediated communication (cmc)
Computer mediated communication (cmc)sajeena81
 
Techniques of teaching physical science
Techniques of teaching physical scienceTechniques of teaching physical science
Techniques of teaching physical sciencesajeena81
 

More from sajeena81 (20)

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristics
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptx
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptx
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptx
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarism
 
Life span psychology
Life span psychologyLife span psychology
Life span psychology
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical science
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable development
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learning
 
E content
E contentE content
E content
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical science
 
Microteaching
MicroteachingMicroteaching
Microteaching
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioning
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variation
 
8. skill of using chalk board
8. skill of using chalk board8. skill of using chalk board
8. skill of using chalk board
 
Microteaching skill of expalining
Microteaching  skill of expaliningMicroteaching  skill of expalining
Microteaching skill of expalining
 
Computer mediated communication (cmc)
Computer mediated communication (cmc)Computer mediated communication (cmc)
Computer mediated communication (cmc)
 
Techniques of teaching physical science
Techniques of teaching physical scienceTechniques of teaching physical science
Techniques of teaching physical science
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Hacking

  • 2. • Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. • And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge.
  • 3. • The term “hacker” is popularly associated with cybercriminals harbouring malicious intentions, when in reality, it’s a lot more. • A hacker can be anyone who utilizes their computer software and hardware knowledge to break down and bypass a computer, device, or network’s security measures. • It’s popularly believed hacking is illegal on principle, which isn’t the case if a system owner willingly and knowingly grants access. • In fact, many private entities and government agencies hire hackers to help maintain their system’s security.
  • 4. • There are two main factors that determine what type of hacker an individual is: their motives and legality of their actions. Hackers are divided into three types— white, black, and grey hat, a naming system that was derived from old western films, where the protagonists would always wear white hats and vice versa for villain characters.
  • 5. 1. Black Hat • Black hat hackers are normally responsible for creating malware, which is frequently used to infiltrate computerized networks and systems. • They’re usually motivated by personal or financial gain, but can also participate in espionage, protests, or merely enjoy the thrill. • Black hat hackers can be anyone from amateurs to highly experienced and knowledgeable individuals looking to spread malware, steal private data, like login credentials, along with financial and personal information. Upon accessing their targets and depending on their motives, black hat hackers can either steal, manipulate, or destroy system data.
  • 6. 2. White Hat • Also known as “ethical hackers,” they’re often employed or contracted by companies and governmental entities, working as security specialists looking for vulnerabilities. • While they employ the same methods as black hat hackers, they always have permission from the system’s owner, making their actions completely legal. • White hat hackers implement strategies like penetration tests, monitor in-place security systems, along with vulnerability assessments. • Ethical hacking, the term used to describe the nature of a white hat hackers’ actions, can even be learned through independent sources, training, conferences, and certifications.
  • 7. 3. Grey Hat • As the name suggests, these individuals utilize aspects from black and white hat hackers, but will usually seek out vulnerabilities in a system without an owner’s permission or knowledge. • While they’ll report any issues they encounter to the owner, they’ll also request some sort of compensation or incentive. Should the owner not respond or reject their proposition, a grey hat hacker might exploit the newfound flaws. • Grey hat hackers aren’t malicious by nature, but do seek to have their efforts rewarded. Since grey hat hackers don’t have permission to access the system by its owner, their actions are ultimately considered illegal, despite any alarming findings they might reveal.