hacking
Sukriti Sehgal
Created on October 24, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
SOCCER GAME SUMMARY
Guide
Transcript
x
start_
HACKING!
Hacking was used to be a process of rough cutting but then was defined as a technology used by the Technical Model Railroad Club to modify the functions of the train sets. Around the 1960s and 1970s, it evolved into more computational and tech related term. Finally, in 1975, hacking was termed as a malicious activity performed to grab sensitive information. In the late 1980s, the first hacker, Robert Morris, made an incident to show the low security.
Brief history of hacking
- WHITE HAT HACKERS
- GREY HAT HACKERS
- BLACK HAT HACKERS
TYpes of hacks
Used to identify flaws in the systems and warn the organizations so that they can make changes and secure their data or information or safeguard from any future dangerous activities. These are also known as “ethical hackers” or “good hackers”.
White Hat Hackers
Hackers look for flaws and vulnerabilities in the system without any permissions. However, they report if they found any issues to the organization so that they can fix the problem. They live in a delusion that what they do is good by hacking websites without permission. Moreover, the organization appreciates their help.
Grey Hat Hackers
Black hat hackers these are break into the system with the intent of getting something from the system for their own good like personal information or passwords, anything that can cause damage to the user or organization. The have only motivation such as financial gain or revenge.
Black Hat Hackers
- Also, known as "White hat".
- This hacking is authorized to check the system for the security reasons.
- They can fix the flaws.
- These hackers are being paid to protect the system and data.
Ethical hacking
- Also, known as "Black hat".
- This hacking is not authorized.
- These uses destructive methods to steal sensitive information and data of the users.
- These activities can harm organizations.
UNEthical hacking
Each type of hacking has its own significance and impact on cybersecurity:1. White hat hacking: Conducted by cybersecurity professionals as they have the authority to test and secure the systems. They identify and fix the problems.2. Black hat hacking: They hack the system for their own good or profit, these are what we called as "Cyberattacks".3. Grey hat hacking: Lies between white and black. They don't have access but they don't harm the system. Prompt the organizations.
How all three forms of hacking-related to Cyber Security
1.https://www.fortinet.com/resources/cyberglossary/what-is-hacking 2. https://staysafeonline.org/resources/the-evolution-of-ethical-hacking-from-curiosity-to-cybersecurity/3. https://www.comptia.org/content/articles/what-is-ethical-hacking
Resources:
x
END__
THANK YOU!