SlideShare a Scribd company logo
1. What is hacking?
2. Types of Hackers
3. Difference between Hackers and
Crackers
4. Criminological theories
5. Academic Studies
• Definition: A hacker or hackers are commonly known as
someone who seeks to exploit weaknesses within
a computer system or network. Hackers can be
associated as a community that works together to
attack a computer or network.
Short Definition: To gain access to (a computer file or network)
illegally or without authorization. (The Free
Dictionary, 2013)
Look at the word cloud below and see if you can identify any meanings
towards the words.

Towards the end of topic 1 the words cloud will help you to associate meanings and
theories to these words.
• The definition of a hacker has been in a long
strand of controversy about what a true hacker
definitions really is and why an individual or
community decide to attack specific
organisations.

“Despite, decades of computer security
research, billions spent on secure operations, and
growing training requirements, we seem incapable
of operating computer securely.” („The
Cybersecurity Risk‟, 2012).
A hacker has to understand computers to an advanced
level. However, it is important to note that there are two
types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a
weaknesses within their computer network.
Or

• A unethical hacker hacks into a system to steal or view
information on purpose.
To understand more about
Hackers and the various types
Please watch the go animate
Videos called
“Groups of Hackers”.
Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1
http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu
m=linkshare&utm_campaign=usercontent

Hackers Hat (White) – GoAnimate Scene 2
http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc
ontent

Hackers Hat (Grey) – GoAnimate Scene 3
http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi
um=linkshare&utm_campaign=usercontent
The title hacker is given to anyone breaking into a
computer. However, professional in the industry argue that
there should be two terms hackers and crackers.
Computer criminals are often seen as committing a
cybercrime through breaking into someone's computer or
computer network known as committing a criminal offence
commonly known as – „Black Hat‟. These types of people
should be called CRACKERS!

Instead of someone known as a computer security expert –
„White Hat‟. These types of people should be called
HACKERS!
Below is some criminological theories presented in hackers research. Please take
note of some of these theories and in your own time research them in more depth.

Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become
Computer Hackers'
Below is some academic studies presented on hackers research. Please take note
of some of these studies and in your own time research them in more depth.

Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
When each section of the material has been read please take
time out and go back onto the Moodle course and locate the
link called „Topic 1 – Hackers Journal‟ .
Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778

Please write down what you have learnt from this PowerPoint
and continue to reflect back on your journal every time a
material has been read in Moodle. This will ultimately help
you to complete your assessment at the end of the course.
Thank You
Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.
Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier.
GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013).
Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press.
Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political
science. London: Yale university Press.
Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier
No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source
Elite, EBSCOhost. Available at:
http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013).
Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological
Review 22 (6), pp. 664–670, JSTOR. Available at:
http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November
2013).
The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27
November 2013).
Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer
Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at:
http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87
497819 (Accessed: 27 November 2013).

More Related Content

What's hot

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
fuckubitches
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Zahid Rajeel
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Hacking
HackingHacking
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
Anant Shrivastava
 
185
185185
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
Rishab Gupta
 

What's hot (20)

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
185
185185
185
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 

Viewers also liked

Theft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglaryTheft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglary
eleanorrrxo
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
Jay Visavadiya
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2joanalynn norte
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
Lesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers ToolLesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers Toolangelyn perez
 
Cooperative Learning with the Computer
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the ComputerJomar Urbano
 
Lesson 9 educational technology 10
Lesson 9  educational  technology  10Lesson 9  educational  technology  10
Lesson 9 educational technology 10
ray mijares
 
eductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Eboraeductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose EboraCarren Pangilinan
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIA
kikayfernandez
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
The computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx aThe computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx achikay04
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
miss yhda
 

Viewers also liked (20)

Theft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglaryTheft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglary
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers ToolLesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers Tool
 
Cooperative Learning with the Computer
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the Computer
 
Lesson 9 educational technology 10
Lesson 9  educational  technology  10Lesson 9  educational  technology  10
Lesson 9 educational technology 10
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
eductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Eboraeductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Ebora
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx aThe computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx a
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
 

Similar to Hacking Presentation

ethics final project
ethics final projectethics final project
ethics final project
Victoriya Poplavskaya
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ict
Abdul Wahab Raza
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
Taibul Islam Tushar
 
Hacking
HackingHacking
Hacking
mubeenm50
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
hackers
hackershackers
hackers
Aya Eltayed
 
Hacking and Civic Hacking
Hacking and Civic HackingHacking and Civic Hacking
Hacking and Civic Hacking
Diego Donaggio
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Steven Hatfield
 
Efficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation ProcessesEfficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation Processes
Mikko Ahonen
 
Deep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdfDeep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdf
allison922660
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
graphhoc
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationMike Linksvayer
 
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG: connecting the knowledge community
 

Similar to Hacking Presentation (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
ethics final project
ethics final projectethics final project
ethics final project
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ict
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
hackers
hackershackers
hackers
 
Hacking and Civic Hacking
Hacking and Civic HackingHacking and Civic Hacking
Hacking and Civic Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Efficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation ProcessesEfficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation Processes
 
Deep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdfDeep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdf
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
 
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 

Hacking Presentation

  • 1.
  • 2. 1. What is hacking? 2. Types of Hackers 3. Difference between Hackers and Crackers 4. Criminological theories 5. Academic Studies
  • 3. • Definition: A hacker or hackers are commonly known as someone who seeks to exploit weaknesses within a computer system or network. Hackers can be associated as a community that works together to attack a computer or network. Short Definition: To gain access to (a computer file or network) illegally or without authorization. (The Free Dictionary, 2013)
  • 4. Look at the word cloud below and see if you can identify any meanings towards the words. Towards the end of topic 1 the words cloud will help you to associate meanings and theories to these words.
  • 5. • The definition of a hacker has been in a long strand of controversy about what a true hacker definitions really is and why an individual or community decide to attack specific organisations. “Despite, decades of computer security research, billions spent on secure operations, and growing training requirements, we seem incapable of operating computer securely.” („The Cybersecurity Risk‟, 2012).
  • 6. A hacker has to understand computers to an advanced level. However, it is important to note that there are two types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a weaknesses within their computer network. Or • A unethical hacker hacks into a system to steal or view information on purpose. To understand more about Hackers and the various types Please watch the go animate Videos called “Groups of Hackers”.
  • 7. Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1 http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu m=linkshare&utm_campaign=usercontent Hackers Hat (White) – GoAnimate Scene 2 http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc ontent Hackers Hat (Grey) – GoAnimate Scene 3 http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi um=linkshare&utm_campaign=usercontent
  • 8. The title hacker is given to anyone breaking into a computer. However, professional in the industry argue that there should be two terms hackers and crackers. Computer criminals are often seen as committing a cybercrime through breaking into someone's computer or computer network known as committing a criminal offence commonly known as – „Black Hat‟. These types of people should be called CRACKERS! Instead of someone known as a computer security expert – „White Hat‟. These types of people should be called HACKERS!
  • 9. Below is some criminological theories presented in hackers research. Please take note of some of these theories and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become Computer Hackers'
  • 10. Below is some academic studies presented on hackers research. Please take note of some of these studies and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
  • 11. When each section of the material has been read please take time out and go back onto the Moodle course and locate the link called „Topic 1 – Hackers Journal‟ . Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778 Please write down what you have learnt from this PowerPoint and continue to reflect back on your journal every time a material has been read in Moodle. This will ultimately help you to complete your assessment at the end of the course. Thank You
  • 12. Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press. Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier. GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013). Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press. Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political science. London: Yale university Press. Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013). Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological Review 22 (6), pp. 664–670, JSTOR. Available at: http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November 2013). The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27 November 2013). Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87 497819 (Accessed: 27 November 2013).