Want to create interactive content? It’s easy in Genially!
gray white black hat
chenchen
Created on October 24, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Fill in the Blanks
View
Museum Flipcards
View
Image Comparison Slider
View
Microcourse: Key Skills for the Professional Environment
View
The Meeting Microlearning
View
The Meeting Microlearning Mobile
View
Corporate Who's Who
Transcript
hacking & cybersecurity
white hat
White hat hackers, or ethical hackers, are cybersecurity professionals that work strictly within the bounds of computer access laws. Their goal is to help strengthen an organization's security measures, and disclose any vulnerabilities they may find while testing.
a brief history of hacking
White hat hackers relate to cybersecurity because they work to strengthen security systems and fight against bad actors. Black hat hackers are the cybercriminals that white hat hackers are fighting against. Grey hat hackers fall in the middle, as another cybersecurity expert that may harm or help depending on the situation.
Write your title here
hacking predates the internet, but since the internet was created, hacks and malware have become more and more prolific
gray hat
Grey hat hackers are in the middle of white and black hat, with no real malicious or ethical aim. They may detect vulnerabilities and share them with an organization and ask for payment in return for the fix, but also threaten to release the information if not compensated.
White, gray, and black hat hackers
1969 - The first computer hackers at MIT altered software and hardware to make them work better
ethical vs unethical hacking
1975 - Microsoft was invented
1983 - The Internet was created
Ethical hacking is a legal, authorized practice aimed at identifying and fixing security flaws to protect systems, while unethical hacking involves illegal, unauthorized attempts to exploit vulnerabilities for malicious purposes, such as theft or sabotage.
Faculty of genially
1984 - Bill Landreth is convicted of hacking NASA and DoD
1986 - Loyd Blankenship published the "hacker's manifesto"
black hat
Black hat hackers are criminals who break into systems with malicious intent, often for financial gain, revenge, or ideological reasons. They use malware, phishing, and other tools to exploit system vulnerabilities.
1984 - Bill Landreth is convicted of hacking NASA and DoD
1988 - Morris Worm was distributed
sources
https://encyclopedia.kaspersky.com/knowledge/a-brief-history-of-hacking/https://www.avast.com/c-hacker-typeshttps://usa.kaspersky.com/resource-center/definitions/hacker-hat-types