Hackers and Crackers! A tiger Claw Presentation 003
-
Upload
lakshmanan-meiyappan -
Category
Education
-
view
873 -
download
8
Transcript of Hackers and Crackers! A tiger Claw Presentation 003
![Page 1: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/1.jpg)
![Page 2: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/2.jpg)
In Cyber security world, the person who is able to exploit the weakness in the system and
manages it to exploit it to accomplish his goal (either good or bad)
Is a
HACKER
Hacking?
![Page 3: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/3.jpg)
Script Kiddie
White Hat Hacker
Black Hat Hacker
Grey Hat Hacker
Hactivitist
Types of
hackers
Black Hat
![Page 4: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/4.jpg)
Script Kiddie
Script Kiddies
![Page 5: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/5.jpg)
• 1.Black hat
Black Hat
![Page 6: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/6.jpg)
• In summary, the term “Black hat" may refer toa hacker who:
• violates computer security for little reasonbeyond maliciousness or for personal gain
• Black hat hackers break into secure networksto destroy data or make the network unusablefor those who are authorized to use thenetwork.
![Page 7: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/7.jpg)
• White Hat
White Hat
![Page 8: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/8.jpg)
• In summary, the term “White hat" may referto a hacker who:
• The term "white hat" in Internet slang refersto an ethical hacker.
• breaks security for non-malicious reasons,perhaps to test their own security system orwhile working for a security company whichmakes security software.
![Page 9: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/9.jpg)
![Page 10: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/10.jpg)
• Grey hat
Grey Hat
![Page 11: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/11.jpg)
• In summary, the term "grey hat" may refer to ahacker who:
• Engages in security research with the intention tosecure rather than exploit
• Grapples with questions of ethics and law in theline of their work.
• Does not support full disclosure of vulnerabilities.
• Usually reports the vulnerability to the productvendor.
![Page 12: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/12.jpg)
![Page 13: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/13.jpg)
![Page 14: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/14.jpg)
HACKERS
Programers with Good intentionswho exploit the weakness.Not for any bad intentions
![Page 15: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/15.jpg)
CRACKERS
Programers with Negative intentionswho exploit the weakness.for many bad intentions
![Page 16: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/16.jpg)
cracking is Often Misunderstood as hacking
Malicious attack on computers is officially called
as cracking
Hacking truly applies to activities having good intentions
![Page 17: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/17.jpg)
![Page 18: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/18.jpg)
![Page 19: Hackers and Crackers! A tiger Claw Presentation 003](https://reader030.fdocuments.in/reader030/viewer/2022013115/55a21ffa1a28ab44368b464f/html5/thumbnails/19.jpg)