Want to create interactive content? It’s easy in Genially!

Get started free

Interactive Tutorial

Chien Lin

Created on October 27, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

Start

Hacking

Yu Chien Lin

01

History of Hacking

A brief history of hacking

Next

Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.

Hackers were enthusiasts just trying to see what new technologies can do.

Back then, there were phone freakers which "freaking" is to generate tones in phone systems to obtain control for the freakers. Now that the internet is more wide spread, intentions of peoplle became more complicated.

02

White Hat Hackers

Next

Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.

Example: Tim Berners-Lee, who invented the World Wide Web, now as the director of the World Wide Web Consortium (W3C) oversees the web.

Info

White Hat aka “ethical hackers” or “good hackers”, are people with good intentions. They hack to find security flaws so people can improve them.

03

Grey Hat Hackers

Next

Surprise your audience with interactive images.

ON ORANGE BUTTON

CLICK

CLICK BUTTON

Example: Khalil Shreateh, reported a flaw to Facebook but got ignored, so he hacked the Facebook page of Mark Zuckerberg to prove his point

Grey Hat is like White Hat but without permmission. They hack into a system for same intentions but they can't be stopped. They may request a fee for finding system flaws from the owners.

04

Black Hat Hackers

Next

Hack for malicious intent, and may do massive damage to target systems.

Driven by self-serve motivations; financial gain, revenge, spread havoc, etc.

Kevin Mitnick, most wanted cybercriminal, hacked into over 40 major corporations

Tsutomu Shimomura, computational physics research scientist, tracked down Kevin Mitnick.

05

Ethical vs. Unethical hacking

Next

Ethical vs. Unethical hacking

Grey Hat Hacker.Although Grey Hat hackers may not have bad intentions but they did not get permission so it is not legal and not ethical.

06

Relationship

Next

How the three forms of hacking are related to Cyber Security

The three forms of hacking are related to cyber security because all intentions aim to safe keep systems in general. In other words, no matter what form of hacking, system owners needs to maintain thier system to be as close to flawless as possible. And this is where cyber security comes into place. Research and studies of security can benefit from hackers giving recommendations and learning from mistakes in the past.

https://sectigostore.com/blog/different-types-of-hackers-hats-explained/

additional sources

https://www.kaspersky.com/resource-center/threats/hackers-and-your-online-privacy

https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking

TYPES OF HACKERS || WHITE HAT || BLACK HAT ||GRAY HAT ||CLASSIFICATION OF HACKERS || ETHICAL HACKING

Black Hat Hacker

Black Hat Hackers hack without permission and have bad intentions. This is not legal and is not ethical.

Do you want your content to be clear and fun? Then interactivity will be your best ally. Select an element and click on the Interactivity button at the top: Label, Window, Show, Link, Go to page, Audio, Expand image, Interactive questions… You choose!

Ethical Hackers

Ethical Hackers or White Hat hackers hack with permission to defend an organization. This is legal and ethical.