Want to create interactive content? It’s easy in Genially!

Get started free

gray white black hat

chenchen

Created on October 24, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Fill in the Blanks

Museum Flipcards

Image Comparison Slider

Microcourse: Key Skills for the Professional Environment

The Meeting Microlearning

The Meeting Microlearning Mobile

Corporate Who's Who

Transcript

hacking & cybersecurity

white hat

White hat hackers, or ethical hackers, are cybersecurity professionals that work strictly within the bounds of computer access laws. Their goal is to help strengthen an organization's security measures, and disclose any vulnerabilities they may find while testing.

a brief history of hacking

White hat hackers relate to cybersecurity because they work to strengthen security systems and fight against bad actors. Black hat hackers are the cybercriminals that white hat hackers are fighting against. Grey hat hackers fall in the middle, as another cybersecurity expert that may harm or help depending on the situation.

Write your title here

hacking predates the internet, but since the internet was created, hacks and malware have become more and more prolific

gray hat

Grey hat hackers are in the middle of white and black hat, with no real malicious or ethical aim. They may detect vulnerabilities and share them with an organization and ask for payment in return for the fix, but also threaten to release the information if not compensated.

White, gray, and black hat hackers

1969 - The first computer hackers at MIT altered software and hardware to make them work better

ethical vs unethical hacking

1975 - Microsoft was invented

1983 - The Internet was created

Ethical hacking is a legal, authorized practice aimed at identifying and fixing security flaws to protect systems, while unethical hacking involves illegal, unauthorized attempts to exploit vulnerabilities for malicious purposes, such as theft or sabotage.

Faculty of genially

1984 - Bill Landreth is convicted of hacking NASA and DoD

1986 - Loyd Blankenship published the "hacker's manifesto"

black hat

Black hat hackers are criminals who break into systems with malicious intent, often for financial gain, revenge, or ideological reasons. They use malware, phishing, and other tools to exploit system vulnerabilities.

1984 - Bill Landreth is convicted of hacking NASA and DoD

1988 - Morris Worm was distributed

sources

https://encyclopedia.kaspersky.com/knowledge/a-brief-history-of-hacking/https://www.avast.com/c-hacker-typeshttps://usa.kaspersky.com/resource-center/definitions/hacker-hat-types