Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

<

>

I

Hacked!!!

What???

start>

>

Do you know that hacking is NOT ALWAYS BAD

Wait What?How is hacking useful?

How did it all started?

What about hackers who hacked accouts for money?

Whats the difference between Ethical and Unethical hacking?

How is then hacking connected with hacking?

Is there anything between good and bad hackers?

>

WhitE Hat hackers

White hat hacking, also known as ethical hacking is a domain that uses hacking skills to help institutions secure their technological infrastructure.For example: If I run a large technology fintech company, I will hire an ethical hacker to try and hack my company. By doing so I will get inputs from the Ethical Hacker about weak access points of my company, thus helping me fix those to safeguard the company.

>

Black Hat hackers

These are the EVIL ones

Black hat hackers often begin as "script kiddies" using pre-made tools and may be trained by profit-driven bosses. Skilled hackers in this field often work for organized crime groups that operate like legitimate businesses, offering customer service, warranties, and specialized tools through the dark web. These hackers develop specialties, like phishing or managing remote access, and find work through dark web forums. While some governments use hacking for intelligence, black hats more commonly work independently or with criminal organizations to make easy money.

>

>

Grey Hat hackers

The not so mischievous ones

Gray hat hackers operate in a gray area between ethical (white hat) and malicious (black hat) hacking. They search for system vulnerabilities without permission, often reporting issues to the owner and sometimes requesting a fee to fix them. While some believe their actions benefit companies by highlighting security gaps, companies rarely welcome these unauthorized actions. Often, gray hat hackers are motivated by a desire for recognition and publicity for their cybersecurity skills.

>

Grey Hat hackers

The not so mischievous ones

Gray hat hackers operate in a gray area between ethical (white hat) and malicious (black hat) hacking. They search for system vulnerabilities without permission, often reporting issues to the owner and sometimes requesting a fee to fix them. While some believe their actions benefit companies by highlighting security gaps, companies rarely welcome these unauthorized actions. Often, gray hat hackers are motivated by a desire for recognition and publicity for their cybersecurity skills.

>

How Did Hacking Stated....

>

How Did Hacking Stated....

Short Answer: in 1960s

Hacking began in the 1960s as enthusiastic users began playing with mainframes. It came of age in the 1980s with phone phreaking and some despicable hacks. By 2000, it reached critical mass and catalyzed wide-scale improvements in cybersecurity and best practices for ethical hacking.

>

Ethical vs Unethical

>

Ethical vs Unethical

While ethical hacking is a permitted, lawful attempt to find out the security flaws with the objective of improving systems, unethical hacking means the very exploitation of those vulnerabilities without permission, normally for gain or to cause harm. Whereas one works as protection, the unethical hacker threatens cybersecurity and privacy.

>

Hacking AND CYBERSECURITY

>

Hacking AND CYBERSECURITY

Ethical white hat hackers in cybersecurity test for and secure systems with permission in pursuit of finding vulnerabilities before breaches. Conversely, black hat hackers would leverage such sorts of vulnerabilities for personal gain or to maliciously threaten data integrity and security. Gray hat hackers are those that really sit in between: they uncover security flaws without permission, sometimes reporting them to the owner, but often motivated by reasons of recognition or financial reward. Together, these roles influence both the defensive and offensive dynamics of cybersecurity.

Thank You

And please secure yourself technolgically.