Want to create interactive content? It’s easy in Genially!
Hacking Types and history.
Evan McCormick
Created on October 30, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Hats of hackers
White, Grey, and Black hat Hackers and a history of hacking.
History of Hacking
Lorem Ipsum
Black Hat
Grey Hat
White Hat
What is a White Hat Hacker?
A white Hat hacker is a hired professional who
- Has permission from the organization they are hacking
- Alerts the parent organization of flaws he/she finds within their system
- Does not exploit or share with others the vulnerabilities they find
Got an idea?
Bring it to life with an interactive window
Create a new layer with all the Genially features.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
What is a black hat hacker?
A black hat hacker is a hacker deliberately trying to break into secure systems
- Without permission from the organization which owns the system being hacked
- For their own personal profit, either directly or indirectly.
- Exploiting or giving others the ability to exploit the vulnerabilities they find.
- Black hat hacking is illegal.
A Brief history of Hacking:
The term "hacking" originally referred to modifying train sets at MIT before shifting to computer alterations. Modern hacking evolved in the 1960s with "phreaking" and in the early 1970s, "Tiger Teams" emerged as government agencies tested computer security. Hacking continued to develop with computer worms and the Computer Fraud and Abuse Act in the 1980s. The late 1990s saw a rise in hacking with figures like Kevin Mitnick. Today, hacking includes ethical practices like penetration testing to proactively identify vulnerabilities. Hackers are divided into three common categories based on the nature and intent behind their attacks: White hats, Grey hats, and Black hats.
What is a Grey Hat Hacker?
A grey hat hacker deliberately hacks into systems
- Without permission from the organization they are hacking into.
- To warn the organization about a security flaw, or raise awareness for a social issue through disruption
- Do not exploit or share with others the vulnerabilities which they find through their efforts.
- Grey hat hacking is illegal.