Want to create interactive content? It’s easy in Genially!
Interactive Tutorial
Chien Lin
Created on October 27, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Start
Hacking
Yu Chien Lin
01
History of Hacking
A brief history of hacking
Next
Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.
Hackers were enthusiasts just trying to see what new technologies can do.
Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.
02
White Hat Hackers
Next
Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.
Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.
Info
White Hat aka “ethical hackers” or “good hackers”, are people with good intentions. They hack to find security flaws so people can improve them.
03
Grey Hat Hackers
Next
Surprise your audience with interactive images.
ON ORANGE BUTTON
CLICK
CLICK BUTTON
Example: Khalil Shreateh, reported a flaw to Facebook but got ignored, so he hacked the Facebook page of Mark Zuckerberg to prove his point
Grey Hat is like White Hat but without permmission. They hack into a system for same intentions but they can't be stopped. They may request a fee for finding system flaws from the owners.
04
Black Hat Hackers
Next
Hack for malicious intent, and may do massive damage to target systems.
Driven by self-serve motivations; financial gain, revenge, spread havoc, etc.
Kevin Mitnick, most wanted cybercriminal, hacked into over 40 major corporations
Tsutomu Shimomura, computational physics research scientist, tracked down Kevin Mitnick.
05
Ethical vs. Unethical hacking
Next
Ethical vs. Unethical hacking
Grey Hat Hacker.Although Grey Hat hackers may not have bad intentions but they did not get permission so it is not legal and not ethical.
06
Relationship
Next
How the three forms of hacking are related to Cyber Security
The three forms of hacking are related to cyber security because all intentions aim to safe keep systems in general. In other words, no matter what form of hacking, system owners needs to maintain thier system to be as close to flawless as possible. And this is where cyber security comes into place. Research and studies of security can benefit from hackers giving recommendations and learning from mistakes in the past.
https://sectigostore.com/blog/different-types-of-hackers-hats-explained/
additional sources
https://www.kaspersky.com/resource-center/threats/hackers-and-your-online-privacy
https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking
TYPES OF HACKERS || WHITE HAT || BLACK HAT ||GRAY HAT ||CLASSIFICATION OF HACKERS || ETHICAL HACKING
Black Hat Hacker
Black Hat Hackers hack without permission and have bad intentions. This is not legal and is not ethical.
Do you want your content to be clear and fun? Then interactivity will be your best ally. Select an element and click on the Interactivity button at the top: Label, Window, Show, Link, Go to page, Audio, Expand image, Interactive questions… You choose!
Ethical Hackers
Ethical Hackers or White Hat hackers hack with permission to defend an organization. This is legal and ethical.