100% found this document useful (1 vote)
147 views

Hacker

This document discusses different types of hackers and their motivations. It begins with definitions of hacking and hackers. It then covers the history of hacking and different classifications such as white hat, black hat, grey hat, phreaker, script kiddy, hacktivist, computer security hacker, academic hacker, and hobby hacker based on their skills and intentions. The document concludes by stating that hacking is illegal and should not be attempted.

Uploaded by

safwanjin
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
147 views

Hacker

This document discusses different types of hackers and their motivations. It begins with definitions of hacking and hackers. It then covers the history of hacking and different classifications such as white hat, black hat, grey hat, phreaker, script kiddy, hacktivist, computer security hacker, academic hacker, and hobby hacker based on their skills and intentions. The document concludes by stating that hacking is illegal and should not be attempted.

Uploaded by

safwanjin
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

IMPACT OF ICT ON SOCIETY

Name: Mohd Safwan bin Mohd Jin I/C: 970331-12-6175 Teacher: Juanah Group members: zaidy, fekri and minsyaril

Hacker (computer security) HACKING

HACKING
-In computer network ,hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. -A hacker is any person engaged in hacking . -The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems.

HISTORY

Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter.TAP was a phone phkreaking newsletter that taught the techniques necessary for the unauthotrized exploration of the network. Many people frooom the phreaking community are also active in the hacking community even today, and vice versa

CLASSIFICATION

Several subgroup of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they

WHITE HAT
White hat has the skills to break into computer systems and do damage. However , they use their skills to help organizations. For example : a white hat might work for an organization to test for security weaknesses and vulnerabilities in network .

BLACK HAT
Black hat known as a cracker uses his skills to break into computer systems for unethical reasons . For example, steal user data like , username and password,credit card numbers, bank information .

GREY HAT

This type can be thought of as a white hat attacker who sometimes acts unethically. They could be employed as a legit network administrator. But ,during this persons duties,he may find an oppurtunity for gaining access to company data and stealing that data.

PHREAKER
A phreaker is simply a hacker of telecommunications. An example of this is tricking the phone system into letting you make free long distance calls.

ACRIPT KIDDY
A script kiddy is someone who lacks the skills of a typical hacker. They rely on downloading hacking programs or utilities sometimes calls scripts to perform on attack.

HACKTIVIST

This is a person with political motivations, such as someone defacing a website and leaving messages on the hacaked site for the world to see.

COMPUTER SECURITY HACKER

This is someone who knows the technical aspects of computer networking security. This person could attack a network protected by a firewall or IPS by fragmenting packets.

ACADEMIC HACKER

This type is typically an employee or studentat an institution of higher education. They would use the institution computing resources to write malicious programs.

HOBBY HACKER

This is someone that tends to focus more on home computing. Such as , modifying existing hardware or software,use software without a license,unlock Apple iphone.

CONCLUSION

Hacking is elligal and breaking the Law .. So dont try hacking

SOURCES OF REFERENCE
http://searchsecurity.techtarget.com/definition /hacker http://en.wikipedia.org /wiki/hacking

You might also like