SlideShare a Scribd company logo
HACKER
HACKER
Group Members
Index
• Abstract (1)
• Introduction (2)
• Problem Statement (3)
• Objective (4)
• Literature Review (5)
• Hacking (6)
• Hacker (7)
• Types of Hackers (8)
• Black Hat Hacker (9)
• White Hat Hacker (10)
• Black Hat Hacker vs White Hat
Hacker (11)
• Conclusion (12)
• References (13)
• Thank you (14)
• Any Question (15)
• Video Link (16)
Abstract
➢Cyberspace hacker or black hat hacker has led to new cyber
crimes such as exploitation of computer system vulnerabilities. In
an effort to mitigate this phenomenon, companies have hired
security professionals with similar skills as malicious hackers to
keep their information safe. So this presentation is an attempt to
discuss Black Hat andWhite Hat Hackers.
1
Introduction
➢Today the modern society reliance on the network technology which give
benefits of collaboration to organizations and individuals.
➢This change also lead us to the new cybercrime (Hacking).
➢To mitigate these issues or to make system secure company professional
hire ethical hacker also known as white hat hacker.
➢So in this presentation we will discuss about the role and positions of
white hat hacker and black hat hacker.
2
Problem Statement
➢Hacking is an exploitation of vulnerability and follows a series of
well-defined actions that make it a process (EC-Council, 2018).
➢White Hat and Black Hat hackers share an almost common hacking
process and skills. One hacker exploit system vulnerabilities to
damage the system or the another one is to resolve the problem.
➢So, it is essential to understand those ethical values are in relation to
back hats and white hat hackers.
3
Objectives
➢To know about hackers and ethical values
➢Role of hackers
➢Black hat and white hat hacker roles and positions
4
Literature Review
➢Company information has been compromised due to security
threats and hacking. With the recent rise of security breaches, many
companies have tried to mislead the hacking incident by hiring
security professionals with similar skills to hackers to ensure that
their infrastructure is safe and that they are ready for threats.
5
Hacking
➢The term hacking means Stole someone information.
➢Hacking or access someone information without there permission is
illegal and it is a crime.
➢To gain access on someone pc or there data by exploiting the
vulnerabilities is known as hacking (sharma, 2008).
6
Hacker
➢The term "hacker" was first used to refer to the best and radical
programmers in the field of computer science (Sharma, 2008).
➢Hack refers to "innovation, style and technical features“
(madarie,n.d).
➢Highly skilled person who can gain authorized or unautherized
access on some other computers or private data (Techterm, 2013).
7
Type of Hacker
8
BLACK HAT HACKER
WHITE HAT HACKER
GREY HAT HACKER
Black Hat Hacker
➢Also known as Cracker.
➢Involve in bad or illegal activities.
➢Do malicious work.
➢Exploit System vulnerabilities to harm other.
➢Trying to harm system and stole useful information.
9
White Hat Hacker
10
➢Also known as Ethical hacker.
➢Penetrate testing and help the organization to secure there system.
➢Follow legal and permission based procedure.
➢Exploit System vulnerabilities to help the organization.
➢Trying to secure system from security threats.
Black Hat Hacker vs White Hat Hacker
Black Hat White Hat
Known as Cracker. Known as Ethical hacker.
Do Illegal and malicious work. Do Legal work.
Damage system and stole data.
protect and help organization to
secure there data.
Exploit System to do malicious
work and own sole purpose.
Exploit System to help other and
protect from threats.
11
Conclusion
➢Hacking has both illegal and legal aspects. Unauthorized access and
use or personal information or computer resources are part of illegal
hacking. Where as legal or ethical aspect has legal limitations and
there is no charge to press. This is being morally and legally justified.
These are the common factor between Black Hat Hacker and White
Hat Hacker.
12
Citation and References
➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited.
➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological
Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446
➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of
MotivationalTypes of Values in a Sample of Hackers Under a Creative
Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC
BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International
Journal of Cyber Criminology, 11(1), 973–5089.
https://doi.org/10.5281/zenodo.495773
➢Link of Research paper =
https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat
_-_The_thin_line_of_ethicsedited
13
Thank you
14
Any Question?
15
Video Link
➢Google Drive
https://drive.google.com/file/d/1ITTWaw3qtn0R0h1hFah
J5dHegkOm-aZn/view?usp=sharing
16

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
Ahmad karawash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Tharindu Kalubowila
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Hacking
HackingHacking
Hacking
pranav patade
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
ABHAY PATHAK
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
Enrico Zimuel
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
cyber security
cyber securitycyber security
cyber security
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 

Similar to White hat and black hat hackers

Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Hackers
HackersHackers
Hackers
kaneesha1234
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
ethics final project
ethics final projectethics final project
ethics final project
Victoriya Poplavskaya
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
ACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptxACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptx
LakshayNRReddy
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
hacking
hackinghacking
hacking
Courtney Cole
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
AKSHAY KHATRI
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Mohit Dholakiya
 
Hackers
HackersHackers
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 

Similar to White hat and black hat hackers (20)

Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
ethics final project
ethics final projectethics final project
ethics final project
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
ACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptxACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
hacking
hackinghacking
hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Hackers
HackersHackers
Hackers
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 

Recently uploaded

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 

Recently uploaded (20)

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 

White hat and black hat hackers

  • 3. Index • Abstract (1) • Introduction (2) • Problem Statement (3) • Objective (4) • Literature Review (5) • Hacking (6) • Hacker (7) • Types of Hackers (8) • Black Hat Hacker (9) • White Hat Hacker (10) • Black Hat Hacker vs White Hat Hacker (11) • Conclusion (12) • References (13) • Thank you (14) • Any Question (15) • Video Link (16)
  • 4. Abstract ➢Cyberspace hacker or black hat hacker has led to new cyber crimes such as exploitation of computer system vulnerabilities. In an effort to mitigate this phenomenon, companies have hired security professionals with similar skills as malicious hackers to keep their information safe. So this presentation is an attempt to discuss Black Hat andWhite Hat Hackers. 1
  • 5. Introduction ➢Today the modern society reliance on the network technology which give benefits of collaboration to organizations and individuals. ➢This change also lead us to the new cybercrime (Hacking). ➢To mitigate these issues or to make system secure company professional hire ethical hacker also known as white hat hacker. ➢So in this presentation we will discuss about the role and positions of white hat hacker and black hat hacker. 2
  • 6. Problem Statement ➢Hacking is an exploitation of vulnerability and follows a series of well-defined actions that make it a process (EC-Council, 2018). ➢White Hat and Black Hat hackers share an almost common hacking process and skills. One hacker exploit system vulnerabilities to damage the system or the another one is to resolve the problem. ➢So, it is essential to understand those ethical values are in relation to back hats and white hat hackers. 3
  • 7. Objectives ➢To know about hackers and ethical values ➢Role of hackers ➢Black hat and white hat hacker roles and positions 4
  • 8. Literature Review ➢Company information has been compromised due to security threats and hacking. With the recent rise of security breaches, many companies have tried to mislead the hacking incident by hiring security professionals with similar skills to hackers to ensure that their infrastructure is safe and that they are ready for threats. 5
  • 9. Hacking ➢The term hacking means Stole someone information. ➢Hacking or access someone information without there permission is illegal and it is a crime. ➢To gain access on someone pc or there data by exploiting the vulnerabilities is known as hacking (sharma, 2008). 6
  • 10. Hacker ➢The term "hacker" was first used to refer to the best and radical programmers in the field of computer science (Sharma, 2008). ➢Hack refers to "innovation, style and technical features“ (madarie,n.d). ➢Highly skilled person who can gain authorized or unautherized access on some other computers or private data (Techterm, 2013). 7
  • 11. Type of Hacker 8 BLACK HAT HACKER WHITE HAT HACKER GREY HAT HACKER
  • 12. Black Hat Hacker ➢Also known as Cracker. ➢Involve in bad or illegal activities. ➢Do malicious work. ➢Exploit System vulnerabilities to harm other. ➢Trying to harm system and stole useful information. 9
  • 13. White Hat Hacker 10 ➢Also known as Ethical hacker. ➢Penetrate testing and help the organization to secure there system. ➢Follow legal and permission based procedure. ➢Exploit System vulnerabilities to help the organization. ➢Trying to secure system from security threats.
  • 14. Black Hat Hacker vs White Hat Hacker Black Hat White Hat Known as Cracker. Known as Ethical hacker. Do Illegal and malicious work. Do Legal work. Damage system and stole data. protect and help organization to secure there data. Exploit System to do malicious work and own sole purpose. Exploit System to help other and protect from threats. 11
  • 15. Conclusion ➢Hacking has both illegal and legal aspects. Unauthorized access and use or personal information or computer resources are part of illegal hacking. Where as legal or ethical aspect has legal limitations and there is no charge to press. This is being morally and legally justified. These are the common factor between Black Hat Hacker and White Hat Hacker. 12
  • 16. Citation and References ➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited. ➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446 ➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of MotivationalTypes of Values in a Sample of Hackers Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International Journal of Cyber Criminology, 11(1), 973–5089. https://doi.org/10.5281/zenodo.495773 ➢Link of Research paper = https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat _-_The_thin_line_of_ethicsedited 13