SlideShare ist ein Scribd-Unternehmen logo
1 von 16
HACKER CULTURE
JACK HSU

Assignment 1
WHAT IS IT?

Hacker culture: deals with hacking ethics and hackers themselves
Hacker:
1. One that hacks
2. An expert at programming and solving problems with a hacker
3. A person who illegally gains access to and sometimes tampers with
information in a computer system
4. Unauthorized use of a system/network
PBS HACKERS

• Hacking happens to everyone
• Not all hacking is with bad intention
• Hackers improve the internet by telling companies bout loop holes
• Example: Dmitry
• Some companies Microsoft aren’t devoting enough time
• Many hackers just for do it just personal pleasure
Right
or
Wrong?

THE ARGUMENT

IS IT RIGHT?
IS IT WRONG?
BUT…TYPES OF HACKERS

1.White Hat hackers:
-Aka Good guys
-They are the professionals
-Test systems and security systems
Usually wont cover tracks
BUT…TYPES OF HACKERS

2.Black hat hackers
-Opposite of white(obviously)
-Iconic image image
-Break into computers and networks
-Computer viruses
-Identify theft, passwords, credit card
BUT…TYPES OF HACKERS

3.Script kiddies:
-Black hat hackers
But….
Uses others programs
Download from internet etc
to make themselves popular
BUT…TYPES OF HACKERS

4.Hacktivists
May be motivated by
Religion
Politics
Revenge
Wrong doing
Harass
=Own entertainment
BUT…TYPES OF HACKERS

5.State sponsored hackers:
To protect military
Hired
To hack into other system(with gov permission)
BUT…TYPES OF HACKERS

6.Spy hacker
Hired hackers
Expose other corporation:
Secrets
Plans
For the companies own good
BUT…TYPES OF HACKERS

7. Cyber terrorists
Motivated by religion & political beliefs
Goal is to create:
Fear
Chaos
Panic
Maybe even death
Most dangerous
Wide range of skills and goals
WAYS TO HACK

Password hack
Virus hacking
Email hacking
Site Hacking
Credit Card hacking
Linux Hacking
Most Common social engineering’s
A FEW CASES

1.

1994, Phonemasters 1.85mil from Spring, AT&T and others, changed FBI
line to sex chat line
2.

1994, Vladimir Levin hacked into Citibank $10mil first internet bank
robbery. All but 400k. 3 years jail. 240K to citibank
3. 2000, DdoS(distributed denial of service).
Yahoo, eBay, buy.com, CNN, Dell, Amazon, Zdnet, E*trade, Excite.
Estimate 1.7 billion lost. Aka Mafiaboy Montreal, 15YO
SAFE YOURSELF!

http://www.youtube.com/watch?v=VPtTJYtfAUs
PICK A SIDE

1.HACKING IS BAD PERIOD.
2.Hacking is good when its for good intentions and not harming anyone
3.Hacking is good either good or bad intentions
BIBLIOGRAPHY

Ahmad, Nadeem. "Hacking CrackingN." Hacking. SlideShare. 01 Nov. 2013
<http://www.slideshare.net/NadeemAhmad16/hacking-14659261>.
"Hacker." Merriam-Webster. Merriam-Webster. 01 Nov. 2013 <http://www.merriamwebster.com/dictionary/hacker>.

Macintyre, Linden. "HACKERS." HACKERS - ProQuest. 06 Dec. 2000. CBC. 01 Nov. 2013
<http://search.proquest.com/docview/190744497>.
"Notable Hacks." Who Are Hackers - Notable Hacks | Hackers | FRONTLINE | PBS. 01 Nov.
2013. PBS. 29 Nov. 2013
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html>.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pagesleoimpact
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 

Was ist angesagt? (20)

Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
About hacker
About hackerAbout hacker
About hacker
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking
Hacking Hacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
HackingHacking
Hacking
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Social engineering
Social engineering Social engineering
Social engineering
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hacking
HackingHacking
Hacking
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Andere mochten auch

Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13Andy Kriebel
 
10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon Pitch10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon PitchKen Tabor
 
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)Fabien Grenet
 
How to start a Startup - Sam Altman
How to start a Startup - Sam AltmanHow to start a Startup - Sam Altman
How to start a Startup - Sam AltmanMads Holmen
 

Andere mochten auch (8)

Hacker Culture
Hacker CultureHacker Culture
Hacker Culture
 
What the HACK is HHVM?
What the HACK is HHVM?What the HACK is HHVM?
What the HACK is HHVM?
 
Hackathon
HackathonHackathon
Hackathon
 
Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13
 
What is a Hackathon?
What is a Hackathon?What is a Hackathon?
What is a Hackathon?
 
10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon Pitch10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon Pitch
 
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
 
How to start a Startup - Sam Altman
How to start a Startup - Sam AltmanHow to start a Startup - Sam Altman
How to start a Startup - Sam Altman
 

Ähnlich wie Hacker culture

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Hacking
HackingHacking
HackingVirus
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 

Ähnlich wie Hacker culture (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
Hacking Hacking
Hacking
 

Kürzlich hochgeladen

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Hacker culture

  • 2. WHAT IS IT? Hacker culture: deals with hacking ethics and hackers themselves Hacker: 1. One that hacks 2. An expert at programming and solving problems with a hacker 3. A person who illegally gains access to and sometimes tampers with information in a computer system 4. Unauthorized use of a system/network
  • 3. PBS HACKERS • Hacking happens to everyone • Not all hacking is with bad intention • Hackers improve the internet by telling companies bout loop holes • Example: Dmitry • Some companies Microsoft aren’t devoting enough time • Many hackers just for do it just personal pleasure
  • 5. BUT…TYPES OF HACKERS 1.White Hat hackers: -Aka Good guys -They are the professionals -Test systems and security systems Usually wont cover tracks
  • 6. BUT…TYPES OF HACKERS 2.Black hat hackers -Opposite of white(obviously) -Iconic image image -Break into computers and networks -Computer viruses -Identify theft, passwords, credit card
  • 7. BUT…TYPES OF HACKERS 3.Script kiddies: -Black hat hackers But…. Uses others programs Download from internet etc to make themselves popular
  • 8. BUT…TYPES OF HACKERS 4.Hacktivists May be motivated by Religion Politics Revenge Wrong doing Harass =Own entertainment
  • 9. BUT…TYPES OF HACKERS 5.State sponsored hackers: To protect military Hired To hack into other system(with gov permission)
  • 10. BUT…TYPES OF HACKERS 6.Spy hacker Hired hackers Expose other corporation: Secrets Plans For the companies own good
  • 11. BUT…TYPES OF HACKERS 7. Cyber terrorists Motivated by religion & political beliefs Goal is to create: Fear Chaos Panic Maybe even death Most dangerous Wide range of skills and goals
  • 12. WAYS TO HACK Password hack Virus hacking Email hacking Site Hacking Credit Card hacking Linux Hacking Most Common social engineering’s
  • 13. A FEW CASES 1. 1994, Phonemasters 1.85mil from Spring, AT&T and others, changed FBI line to sex chat line 2. 1994, Vladimir Levin hacked into Citibank $10mil first internet bank robbery. All but 400k. 3 years jail. 240K to citibank 3. 2000, DdoS(distributed denial of service). Yahoo, eBay, buy.com, CNN, Dell, Amazon, Zdnet, E*trade, Excite. Estimate 1.7 billion lost. Aka Mafiaboy Montreal, 15YO
  • 15. PICK A SIDE 1.HACKING IS BAD PERIOD. 2.Hacking is good when its for good intentions and not harming anyone 3.Hacking is good either good or bad intentions
  • 16. BIBLIOGRAPHY Ahmad, Nadeem. "Hacking CrackingN." Hacking. SlideShare. 01 Nov. 2013 <http://www.slideshare.net/NadeemAhmad16/hacking-14659261>. "Hacker." Merriam-Webster. Merriam-Webster. 01 Nov. 2013 <http://www.merriamwebster.com/dictionary/hacker>. Macintyre, Linden. "HACKERS." HACKERS - ProQuest. 06 Dec. 2000. CBC. 01 Nov. 2013 <http://search.proquest.com/docview/190744497>. "Notable Hacks." Who Are Hackers - Notable Hacks | Hackers | FRONTLINE | PBS. 01 Nov. 2013. PBS. 29 Nov. 2013 <http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html>.

Hinweis der Redaktion

  1. http://search.proquest.com.ezproxy.lib.ryerson.ca/docview/190744497
  2. http://www.merriam-webster.com/dictionary/hacker
  3. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  4. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  5. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  6. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  7. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  8. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  9. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  10. http://www.slideshare.net/NadeemAhmad16/hacking-14659261
  11. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html