Want to create interactive content? It’s easy in Genially!
Cybersecurity: 3 Types of Hacking
Margarita Espinoza
Created on February 25, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Interactive Image with Information
View
Interactive Human Body Image
View
Interactive Artwork Image
View
Interactive Product Image
View
Essential Square Interactive Image
View
Akihabara Vertical Interactive Image
View
Interactive Nature Image
Transcript
Hackers
Types of Hackers
White, Black, Grey Hats
A Brief History
Before hacking was done on computers, it was associated with telephones. In the 1960's a type of hacking called phreaking was used to trick phones into receiving operational commands with a high pitched noise or whistle. Computer hacking was introduced in the 1970's when the Air Force commisioned the first pentesters to hack their system. These early hackers where called 'Tiger Teams'.
Ethical vs Unethical
Hacking Differences
Cybersecurity
How Hacking Relates
Resources
Additional Sources
Hackers
White, Black, and Grey Hats
White Hats: (The good guys) are hackers that help organizations by finding loopholes and bugs in their systems to prevent attacks. Black Hats: (The bad guys) are hackers that hack into organizations for financial/personal gain or malicious intent. Grey Hats: (The ? guys) are hackers that can help organizations, like White Hats, although their motives are unclear and sometimes also for financial gain.
Additional Resources
Hacking
A Brief History of Hacking, Cobalt 2022
The Line Between Ethical and Unethical Hacking, Medium 2023.
Ethical Hacking vs Cyber Security , KnowledgeHut, 2024
Ethical vs Unethical
The Ethicality of Hacking
The main difference between ethical and unethical hacking is whether permission was granted from an organization. Eithical hackers (White Hat) have the support of an organization to hack into their system for the sole purpose of identifying their vulnerabilities. Unethical hackers (Black Hat) do not have an org's permission and will hack into a system for financial/personal gain or malicious intent.
Cybersecurity
How the 3 Hackers Relate
Cybersecurity is the process of protecting technical assests (data, networks, computers) against cyber attackers who intend to steal, harm, or change information from an organization. White, Black, and Grey Hat hackers relate to cybersecurity because they are both what help protect organizations and also what threat organizations. White Hat hackers help organizatins by identifying their weaknesses. Black Hat hackers harm organizations by hacking their systems for personal gain or malicious intent.