Interactive Tutorial
Chien Lin
Created on October 27, 2024
More creations to inspire you
Transcript
Yu Chien Lin
Hacking
Start
Next
A brief history of hacking
History ofHacking
01
Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.
Hackers were enthusiasts just trying to see what new technologies can do.
Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.
Next
White Hat Hackers
02
White Hat aka “ethical hackers” or “good hackers”, are people with good intentions. They hack to find security flaws so people can improve them.
Info
Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.
Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.
Next
Grey Hat Hackers
03
Grey Hat is like White Hat but without permmission. They hack into a system for same intentions but they can't be stopped. They may request a fee for finding system flaws from the owners.
Example: Khalil Shreateh, reported a flaw to Facebook but got ignored, so he hacked the Facebook page of Mark Zuckerberg to prove his point
CLICK BUTTON
CLICK
ON ORANGE BUTTON
Surprise your audience with interactive images.
Next
Black Hat Hackers
04
Tsutomu Shimomura, computational physics research scientist, tracked down Kevin Mitnick.
Kevin Mitnick, most wanted cybercriminal, hacked into over 40 major corporations
Driven by self-serve motivations; financial gain, revenge, spread havoc, etc.
Hack for malicious intent, and may do massive damage to target systems.
Next
Ethical vs. Unethical hacking
05
1
2
4
3
Grey Hat Hacker.Although Grey Hat hackers may not have bad intentions but they did not get permission so it is not legal and not ethical.
Ethical vs. Unethical hacking
Next
Relationship
06
The three forms of hacking are related to cyber security because all intentions aim to safe keep systems in general. In other words, no matter what form of hacking, system owners needs to maintain thier system to be as close to flawless as possible. And this is where cyber security comes into place. Research and studies of security can benefit from hackers giving recommendations and learning from mistakes in the past.
How the three forms of hacking are related to Cyber Security
https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking
https://www.kaspersky.com/resource-center/threats/hackers-and-your-online-privacy
additional sources
https://sectigostore.com/blog/different-types-of-hackers-hats-explained/
TYPES OF HACKERS || WHITE HAT || BLACK HAT ||GRAY HAT ||CLASSIFICATION OF HACKERS || ETHICAL HACKING
1
Black Hat Hackers hack without permission and have bad intentions. This is not legal and is not ethical.
Black Hat Hacker
3
Do you want your content to be clear and fun? Then interactivity will be your best ally. Select an element and click on the Interactivity button at the top: Label, Window, Show, Link, Go to page, Audio, Expand image, Interactive questions… You choose!
Ethical Hackers or White Hat hackers hack with permission to defend an organization. This is legal and ethical.
Ethical Hackers
2