Want to make creations as awesome as this one?

Transcript

x

start_

HACKING!

Hacking was used to be a process of rough cutting but then was defined as a technology used by the Technical Model Railroad Club to modify the functions of the train sets. Around the 1960s and 1970s, it evolved into more computational and tech related term. Finally, in 1975, hacking was termed as a malicious activity performed to grab sensitive information. In the late 1980s, the first hacker, Robert Morris, made an incident to show the low security.

Brief history of hacking

  • WHITE HAT HACKERS
  • GREY HAT HACKERS
  • BLACK HAT HACKERS

TYpes of hacks

Used to identify flaws in the systems and warn the organizations so that they can make changes and secure their data or information or safeguard from any future dangerous activities. These are also known as “ethical hackers” or “good hackers”.

White Hat Hackers

Hackers look for flaws and vulnerabilities in the system without any permissions. However, they report if they found any issues to the organization so that they can fix the problem. They live in a delusion that what they do is good by hacking websites without permission. Moreover, the organization appreciates their help.

Grey Hat Hackers

Black hat hackers these are break into the system with the intent of getting something from the system for their own good like personal information or passwords, anything that can cause damage to the user or organization. The have only motivation such as financial gain or revenge.

Black Hat Hackers

  • Also, known as "White hat".
  • This hacking is authorized to check the system for the security reasons.
  • They can fix the flaws.
  • These hackers are being paid to protect the system and data.

Ethical hacking

  • Also, known as "Black hat".
  • This hacking is not authorized.
  • These uses destructive methods to steal sensitive information and data of the users.
  • These activities can harm organizations.

UNEthical hacking

Each type of hacking has its own significance and impact on cybersecurity:1. White hat hacking: Conducted by cybersecurity professionals as they have the authority to test and secure the systems. They identify and fix the problems.2. Black hat hacking: They hack the system for their own good or profit, these are what we called as "Cyberattacks".3. Grey hat hacking: Lies between white and black. They don't have access but they don't harm the system. Prompt the organizations.

How all three forms of hacking-related to Cyber Security

1.https://www.fortinet.com/resources/cyberglossary/what-is-hacking 2. https://staysafeonline.org/resources/the-evolution-of-ethical-hacking-from-curiosity-to-cybersecurity/3. https://www.comptia.org/content/articles/what-is-ethical-hacking

Resources:

x

END__

THANK YOU!