Want to create interactive content? It’s easy in Genially!

Reuse this genially

CS Hacking

Alexander Garofalo

Created on October 30, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Vertical Genial One Pager

Mobile App Dossier

Color Shapes Dossier

Notes Dossier

Futuristic Tech Dossier

Crowdfunding Campaign

Company Dossier

Transcript

White Hat Hackers

A Brief History of Hacking

White-hat hackers are ethical hackers that are typically authorized to tests systems with explicit permission. Their actions are legal as they identify and repair possible weakness in a companies systems.

Hacking started off as playful; however, as the public started using computers, we saw a rise in hacking. From it curious roots, hacking now threatens individual and company cyber security.

Hacking and Cybersecurity

Grey Hat Hackers

Ethical Vs. Unethical Hacking

Grey-hat hackers are in-between a white-hat and black-hat hackers. They do not have explicit permission to access a system; however, rather than using the access for malicious purposes, they coerce companies into acting (think hacktivist).

An infograohic by Alexander GarofaloUsing Genial

Ethical hacking is when someone has permission to break through a system to test for vulnerabilities, like penetration testing. An unethical hacker does not have authorization and proceeds on their own volition.

Hackings Impact on Cybersecurity

Black Hat Hackers

Black-hat actors are what we typically think of when we think of hackers. They do not have authorized permission like grey-hat hackers, and they do have malicious intent. Black-hat hackers typically attack for personal gain.

Hacking started out of curiosity; however, it now plays a vital role in cybersecurity. Hackers have developed tools and techniques to find vulnerabilities in an individual or companies’ system. They may then steal data or hold it for ransom. As the methods of hackers have become mor sophisticated, so have the defensive strategies. White hat hackers test for vulnerabilities to protect systems.

1965

Late 1960's

1988

1990's

2020's

An increase in AI and new tools used for hacking

MIT creates the first computer password

Hacktivism and High-Profile Attacks

The MIT Password is hacked to get more computer time

The first worm (Morris Worm) is released

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!

Got an idea?

Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:

  • Visit the Analytics settings;
  • Activate user tracking;
  • Let the communication flow!