SlideShare a Scribd company logo
CYBER SECURITY
TRAINING INSTITUTE
INFOSAVVY
wwww.info-savvy.com
About us
INFO-SAVVY
Infosavvy is a training institute providing
trainings and certifications in multiple
domains viz IT Management, Information
Security Management, Cyber Security &
Quality management to aspiring
technology professionals.
INFOSAVVY
www.info-savvy.com
What is Hacking?
AND
Types of Hackers
www.info-savvy.com
INFOSAVVY
What is Hacking?
Hacking in the field of computer security refers to
exploiting system vulnerabilities and compromising
security controls to gain unauthorized or
inappropriate access to system resources.
It involves modifying system or application features
to achieve a goal outside its creator's original
purpose.
www.info-savvy.com
INFOSAVVY
WHITE HAT
HACKERS.
BLACK HAT
HACKERS
GARY HAT
HACKERS
TYPES OF HACKERS
www.info-savvy.com
INFOSAVVY
White hat hackers
Additionally called ethical hackers, try to work within
the public's best interest, instead of to make turmoil.
Many white hat hackers work doing penetration
testing, hired to try to interrupt into the company's
networks to search out and report on security
vulnerabilities. The protection companies then help
their customers mitigate security problems before
criminal hackers will exploit them.
www.info-savvy.com
INFOSAVVY
Intentionally gain unauthorized access to networks and
systems with malicious intent, whether or not to steal
information, unfold malware or benefit from ransom ware,
vandalism or otherwise injury systems or for the other
reason -- as well as gaining infamy. Black hat hackers are
criminals by definition because they violate laws against
accessing systems while not authorization, however they'll
additionally interact in different criminal activity, together
with fraud and distributed denial-of-service attacks
www.info-savvy.com
Black hat hackers
INFOSAVVY
Gary hat hackers
Fall somewhere between white hat hackers and black hat
hackers. Whereas their motives is also almost like those of
white hat hackers, grey hats are a lot of possible than white
hat hackers to access systems while not authorization; at
identical time, they're a lot of possible than black hat
hackers to avoid doing unneeded injury to the systems they
hack. Though they are not generally -- or solely -- actuated
by cash, Grey hat hackers could provide to fix vulnerabilities
they need discovered through their own, unauthorized,
activities instead of exploitation their information to use
vulnerabilities for illegal profit.
www.info-savvy.com
INFOSAVVY
Who is a Hacker?
Types of Hackers
A hacker is a person, who breaks into a system or network
without any authorization to destroy, steal sensitive data, or
performs malicious attacks. Hacker is an intelligent
individual with excellent computer skills, along with the
ability to create and explore into the computer's software
and hardware.
Usually a hacker would be a skilled engineer or programmer
with enough knowledge to discover vulnerabilities in a
target system. She/he is generally a subject expert and
enjoys learning the details of various programming
languages and computer systems.
www.info-savvy.com
INFOSAVVY
The subsequent list classifies hackers
consistent with their intent.
Ethical Hacker (White hat): A hacker WHO gains access to
systems with a read to fix the identified weaknesses. They will
additionally perform penetration Testing and vulnerability
assessments.
Cracker (Black hat): A hacker who gains unauthorized access
to pc systems for private gain. The intent is sometimes to steal
company information, violate privacy rights, transfer funds from
bank accounts etc.
www.info-savvy.com
INFOSAVVY
Grey hat: A hacker who is in between moral and black hat hackers.
He/she breaks into pc systems while not authority with a read to
spot weaknesses and reveals them to the system owner.
Hacktivist: A hacker who use hacking to send social, religious, and
political, etc. messages. This can be sometimes done by hijacking
web sites and exploit the message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in
telephones rather than computers.
Script kiddies: A non-skilled one that gains access to pc systems
using already created tools.
www.info-savvy.com
INFOSAVVY
Get in Touch
WWW.INFO-SAVVY.COM
THANK YOU
INFOSAVVY
+91 9987378932

More Related Content

What's hot

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
daniyalqureshi712
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Ethical hacking
Ethical hacking Ethical hacking
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Cyber crime
Cyber crimeCyber crime
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Hacking
HackingHacking
Hacking
Ranjan Som
 

What's hot (20)

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Hacking
HackingHacking
Hacking
 

Similar to What is Hacking? AND Types of Hackers

Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Midhun
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
Alefya1
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Hacking
HackingHacking
Hacking
pranav patade
 
my new HACKING
my new HACKINGmy new HACKING
Hackers
HackersHackers
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking.!!
All About Hacking.!! All About Hacking.!!

Similar to What is Hacking? AND Types of Hackers (20)

Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hackers
HackersHackers
Hackers
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

What is Hacking? AND Types of Hackers

  • 2. About us INFO-SAVVY Infosavvy is a training institute providing trainings and certifications in multiple domains viz IT Management, Information Security Management, Cyber Security & Quality management to aspiring technology professionals. INFOSAVVY www.info-savvy.com
  • 3. What is Hacking? AND Types of Hackers www.info-savvy.com INFOSAVVY
  • 4. What is Hacking? Hacking in the field of computer security refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources. It involves modifying system or application features to achieve a goal outside its creator's original purpose. www.info-savvy.com INFOSAVVY
  • 5. WHITE HAT HACKERS. BLACK HAT HACKERS GARY HAT HACKERS TYPES OF HACKERS www.info-savvy.com INFOSAVVY
  • 6. White hat hackers Additionally called ethical hackers, try to work within the public's best interest, instead of to make turmoil. Many white hat hackers work doing penetration testing, hired to try to interrupt into the company's networks to search out and report on security vulnerabilities. The protection companies then help their customers mitigate security problems before criminal hackers will exploit them. www.info-savvy.com INFOSAVVY
  • 7. Intentionally gain unauthorized access to networks and systems with malicious intent, whether or not to steal information, unfold malware or benefit from ransom ware, vandalism or otherwise injury systems or for the other reason -- as well as gaining infamy. Black hat hackers are criminals by definition because they violate laws against accessing systems while not authorization, however they'll additionally interact in different criminal activity, together with fraud and distributed denial-of-service attacks www.info-savvy.com Black hat hackers INFOSAVVY
  • 8. Gary hat hackers Fall somewhere between white hat hackers and black hat hackers. Whereas their motives is also almost like those of white hat hackers, grey hats are a lot of possible than white hat hackers to access systems while not authorization; at identical time, they're a lot of possible than black hat hackers to avoid doing unneeded injury to the systems they hack. Though they are not generally -- or solely -- actuated by cash, Grey hat hackers could provide to fix vulnerabilities they need discovered through their own, unauthorized, activities instead of exploitation their information to use vulnerabilities for illegal profit. www.info-savvy.com INFOSAVVY
  • 9. Who is a Hacker? Types of Hackers A hacker is a person, who breaks into a system or network without any authorization to destroy, steal sensitive data, or performs malicious attacks. Hacker is an intelligent individual with excellent computer skills, along with the ability to create and explore into the computer's software and hardware. Usually a hacker would be a skilled engineer or programmer with enough knowledge to discover vulnerabilities in a target system. She/he is generally a subject expert and enjoys learning the details of various programming languages and computer systems. www.info-savvy.com INFOSAVVY
  • 10. The subsequent list classifies hackers consistent with their intent. Ethical Hacker (White hat): A hacker WHO gains access to systems with a read to fix the identified weaknesses. They will additionally perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to pc systems for private gain. The intent is sometimes to steal company information, violate privacy rights, transfer funds from bank accounts etc. www.info-savvy.com INFOSAVVY
  • 11. Grey hat: A hacker who is in between moral and black hat hackers. He/she breaks into pc systems while not authority with a read to spot weaknesses and reveals them to the system owner. Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This can be sometimes done by hijacking web sites and exploit the message on the hijacked website. Phreaker: A hacker who identifies and exploits weaknesses in telephones rather than computers. Script kiddies: A non-skilled one that gains access to pc systems using already created tools. www.info-savvy.com INFOSAVVY
  • 12. Get in Touch WWW.INFO-SAVVY.COM THANK YOU INFOSAVVY +91 9987378932