Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

Yu Chien Lin

Hacking

Start

Next

A brief history of hacking

History ofHacking

01

Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.

Hackers were enthusiasts just trying to see what new technologies can do.

Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.

Next

White Hat Hackers

02

White Hat aka “ethical hackers” or “good hackers”, are people with good intentions. They hack to find security flaws so people can improve them.

Info

Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.

Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.

Next

Grey Hat Hackers

03

Grey Hat is like White Hat but without permmission. They hack into a system for same intentions but they can't be stopped. They may request a fee for finding system flaws from the owners.

Example: Khalil Shreateh, reported a flaw to Facebook but got ignored, so he hacked the Facebook page of Mark Zuckerberg to prove his point

CLICK BUTTON

CLICK

ON ORANGE BUTTON

Surprise your audience with interactive images.

Next

Black Hat Hackers

04

Tsutomu Shimomura, computational physics research scientist, tracked down Kevin Mitnick.

Kevin Mitnick, most wanted cybercriminal, hacked into over 40 major corporations

Driven by self-serve motivations; financial gain, revenge, spread havoc, etc.

Hack for malicious intent, and may do massive damage to target systems.

Next

Ethical vs. Unethical hacking

05

1

2

4

3

Grey Hat Hacker.Although Grey Hat hackers may not have bad intentions but they did not get permission so it is not legal and not ethical.

Ethical vs. Unethical hacking

Next

Relationship

06

The three forms of hacking are related to cyber security because all intentions aim to safe keep systems in general. In other words, no matter what form of hacking, system owners needs to maintain thier system to be as close to flawless as possible. And this is where cyber security comes into place. Research and studies of security can benefit from hackers giving recommendations and learning from mistakes in the past.

How the three forms of hacking are related to Cyber Security

https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking

https://www.kaspersky.com/resource-center/threats/hackers-and-your-online-privacy

additional sources

https://sectigostore.com/blog/different-types-of-hackers-hats-explained/

TYPES OF HACKERS || WHITE HAT || BLACK HAT ||GRAY HAT ||CLASSIFICATION OF HACKERS || ETHICAL HACKING

1

Black Hat Hackers hack without permission and have bad intentions. This is not legal and is not ethical.

Black Hat Hacker

3

Do you want your content to be clear and fun? Then interactivity will be your best ally. Select an element and click on the Interactivity button at the top: Label, Window, Show, Link, Go to page, Audio, Expand image, Interactive questions… You choose!

Ethical Hackers or White Hat hackers hack with permission to defend an organization. This is legal and ethical.

Ethical Hackers

2