Tuan Nguyen - White, Grey, and Black Hat Hackers
Tuan Nguyen
Created on October 26, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
FALL ZINE 2018
Presentation
BRANCHES OF U.S. GOVERNMENT
Presentation
QUOTE OF THE WEEK ACTIVITY - 10 WEEKS
Presentation
MASTER'S THESIS ENGLISH
Presentation
SPANISH: PARTES DE LA CASA WITH REVIEW
Presentation
PRIVATE TOUR IN SÃO PAULO
Presentation
SUMMER ZINE 2018
Presentation
Transcript
White, Grey, and Black Hat Hackers
CYBERSECURITY FOR DATA SCIENCETUAN NGUYEN
A brief history of hacking
mid-1900s
The term Hacking began
1980s
The Dawn of Computer Hacking
1990s
Hacking Goes Mainstream
WHITE HAT HACKERS
White hat hackers use their skills to identify security gaps, helping organizations reduce risks and prevent breaches. Pentesters specialize in uncovering system vulnerabilities.
GREY HAT HACKERS
Gray hat hackers find security flaws without permission, often offering fixes for payment. While not malicious, their actions are unauthorized and may lead to legal issues and controversy.
BLACK HAT HACKERS
Black hat hackers exploit systems illegally for personal gain, causing harm through data breaches, theft, and ransomware attacks. Their primary goal is often financial profit or creating chaos.
ETHICAL VS UNETHICAL HACKING
- Ethical Hacking: Authorized, aims to identify and fix security vulnerabilities to protect systems.
- Unethical Hacking: Unauthorized, exploits vulnerabilities to cause harm, steal data, or gain unauthorized access.
ROLE OF HACKING IN CYBERSRCURITY
WHITE HAT
HACKERS
Work to strengthen cybersecurity by identifying vulnerabilities and providing solutions, helping organizations protect their systems from attacks.
GREY HAT
HACKERS
Find security flaws without permission, often reporting them to organizations, but may operate in legally gray areas.
BLACK HAT
HACKERS
Pose significant threats to cybersecurity by exploiting vulnerabilities for malicious purposes, such as data theft or disruption.
Additional sources
1. A Brief History of Hacking | Cobalt [https://www.cobalt.io/blog/history-of-hacking]2. Different Types of Hackers: Who Are They? [https://online.king.edu/infographics/different-types-of-hackers-who-are-they/]3. Be aware: there are 6 types of hackers [https://www.bulletproof.co.uk/blog/different-types-of-hackers]4. What is Hacking? [https://www.fortinet.com/resources/cyberglossary/what-is-hacking]5. Hacker Types: Black Hat, White Hat, and Gray Hat Hackers [https://www.avast.com/c-hacker-types#]
THANK YOU!
XXXX
Did you know that... We retain 42% more information when the content moves? It is perhaps the most effective resource to capture the attention of your audience.
XXXX
¡Beware! In Genially, we use AI (Awesome Interactivity) in all our designs, so you can level up with interactivity and transform your content into something that adds value and hooks.
XXXX
You can add additional content that excites your audience's brain: videos, images, links, interactivity... Whatever you want!