Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

White, Grey, and Black Hat Hackers

CYBERSECURITY FOR DATA SCIENCETUAN NGUYEN

A brief history of hacking

mid-1900s

The term Hacking began

1980s

The Dawn of Computer Hacking

1990s

Hacking Goes Mainstream

WHITE HAT HACKERS

White hat hackers use their skills to identify security gaps, helping organizations reduce risks and prevent breaches. Pentesters specialize in uncovering system vulnerabilities.

GREY HAT HACKERS

Gray hat hackers find security flaws without permission, often offering fixes for payment. While not malicious, their actions are unauthorized and may lead to legal issues and controversy.

BLACK HAT HACKERS

Black hat hackers exploit systems illegally for personal gain, causing harm through data breaches, theft, and ransomware attacks. Their primary goal is often financial profit or creating chaos.

ETHICAL VS UNETHICAL HACKING

  • Ethical Hacking: Authorized, aims to identify and fix security vulnerabilities to protect systems.
  • Unethical Hacking: Unauthorized, exploits vulnerabilities to cause harm, steal data, or gain unauthorized access.

ROLE OF HACKING IN CYBERSRCURITY

WHITE HAT

HACKERS

Work to strengthen cybersecurity by identifying vulnerabilities and providing solutions, helping organizations protect their systems from attacks.

GREY HAT

HACKERS

Find security flaws without permission, often reporting them to organizations, but may operate in legally gray areas.

BLACK HAT

HACKERS

Pose significant threats to cybersecurity by exploiting vulnerabilities for malicious purposes, such as data theft or disruption.

Additional sources

1. A Brief History of Hacking | Cobalt [https://www.cobalt.io/blog/history-of-hacking]2. Different Types of Hackers: Who Are They? [https://online.king.edu/infographics/different-types-of-hackers-who-are-they/]3. Be aware: there are 6 types of hackers [https://www.bulletproof.co.uk/blog/different-types-of-hackers]4. What is Hacking? [https://www.fortinet.com/resources/cyberglossary/what-is-hacking]5. Hacker Types: Black Hat, White Hat, and Gray Hat Hackers [https://www.avast.com/c-hacker-types#]

THANK YOU!

XXXX

Did you know that... We retain 42% more information when the content moves? It is perhaps the most effective resource to capture the attention of your audience.

XXXX

¡Beware! In Genially, we use AI (Awesome Interactivity) in all our designs, so you can level up with interactivity and transform your content into something that adds value and hooks.

XXXX

You can add additional content that excites your audience's brain: videos, images, links, interactivity... Whatever you want!