Want to make interactive content? It’s easy in Genially!

Data Science CyberSecurity 4.1B Assignment =

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

Hacking began in the 1960s as way that computer scientists started experimenting with systems for fun, and while exploring they came across these techniques to hack systems, and named it as hacking. Earlier this skills were more used to solve problems. But, as technology increased, hacking took a turn, started hacking as a to take advantage of the people vulnerability. Now hacking often considered as a negative lens

1. Brief history of Hacking:

White hat hackers use their skills to help organization to protect them from cyber threats. They are sort of like security consultants who are hired to identify weakness in the system before the hackers exploit them. By working with the companies they improve security, which is crucial to build trust between customers and company.

2. White Hat Hackers:

They take middle ground between black and white, they exploit vulnerability without permission, but often they do help organizations to protect their systems. However, there actions can sometimes be confusing, they work at a complicated space, which tells us that not every hacker fits into one category.

3. Grey Hat Hackers:

These guys exploit the vulnerabilities and look for personal gain. Stealing sensitive data, causing systems to crash, their motivation generally revolve around financial gain. Understanding the black hat mindset is essential for developing security strategies to protect from their attacks

4. Black Hat Hacker:

Difference lies In the type of action hackers take. An hacker could be said he is ethical if he takes consent from the organization to access their systems, and help them protect, and if the same hacker tries to exploit and take these opportunityity for his advantage, and if he tries to access the system without the consent this is could be said to be unethical.

5. Ethical vs unethical :

The relationship amongst all three hats is important in the cyber security space. White helps protect from the attacks and tries to reduce the weakness in the systems. Grey hat hackers can be help reveal vulnerabilities, but their approach to that problem could sometimes be unethical. Black hat hackers can be threat to the cybersecurity community at edge, and without these guys there won’t be much of an improvement in the cybersecurity space.

6. How all three form of hacking relate to cyber security:

  • The Cyber Mentor - YouTube
  • Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley
  • The Ethical Hacker's Handbook: How to Conduct a Penetration Test. Wiley.
  • Computer Security: Principles and Practice. Pearson.

7. Resources: