2. Hacking
Advantages
Keep us alert
about our safety
Can be used to
recover lost
information
where the
computer
password has
been lost
Disadvantages Criminal can use
it & harm privacy
3. Although hacking is most often associated in
the popular consciousness with one code
breaker breaking into a computer to steal data
or wreak havoc, the word is used in a variety of
senses. Within tech communities, the word
often refers to "hacking together" a quick
program to solve a problem creatively. hacking
someone account is disrespecting some ones
privacy.
What is hacking?
4. Hackers do what they do using a variety of
methods. They're usually adept at working with
computers, which makes them good at finding
security vulnerabilities. Another way that
hackers get data that is seldom discussed is
called "social engineering." Social engineering is
a private investigator-like way of getting data;
you pose as someone you're not on the phone or
in an email to get the information you need.
How is hacking done?
5. Not all hackers are bad. Many work for good in
a variety of ways. "White hat" hackers are
hackers that work to either expose
vulnerabilities in computer systems so they can
be repaired or exploit vulnerabilities in
organizations they dislike as a form of activism.
Although hacking really is isn't as glamorous as
it is in the movies, the reality is a lot more
interesting. There's clearly more to it than lone
code breakers breaking into government
computer systems overnight.
Are all hackers bad?
6.
7. 1. White hat hackers -
source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29
Struan Robertson, legal director at Pinsent Masons LLP, and editor of
OUT-LAW.com, says "Broadly speaking, if the access to a system is
authorized, the hacking is ethical and legal. If it isn't, there's an
offence under the Computer Misuse Act. The unauthorized access
offence covers everything from guessing the password, to accessing
someone's webmail account, to cracking the security of a bank. The
maximum penalty for unauthorized access to a computer is two years
in prison and a fine. There are higher penalties – up to 10 years in
prison – when the hacker also modifies data". Unauthorized access
even to expose vulnerabilities for the benefit of many is not legal, says
Robertson. "There's no defense in our hacking laws that your behavior
is for the greater good. Even if it's what you believe."
Legal hackers hacking with good intention
not have intention harm any ones privacy
8. "black hat" hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
Black hat hackers form the stereotypical, illegal hacking groups often
portrayed in popular culture, and are "the epitome of all that the public
fears in a computer criminal". Black hat hackers break into secure networks
to destroy, modify, or steal data; or to make the network unusable for those
who are authorized to use the network. Black hat hackers are also referred
to as the "crackers" within the security industry and by modern
programmers. Crackers keep the awareness of the vulnerabilities to
themselves and do not notify the general public or the manufacturer for
patches to be applied. Individual freedom and accessibility is promoted over
privacy and security. Once they have gained control over a system, they
may apply patches or fixes to the system only to keep their reigning control.
Richard Stallman invented the definition to express the maliciousness of a
criminal hacker versus a white hat hacker who performs hacking duties to
identify places to repair.
2. Black hat hackers -
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
9. Grey hat hacker lies between a black hat and a white
hat hacker. A grey hat hacker may surf the Internet and
hack into a computer system for the sole purpose of
notifying the administrator that their system has a
security defect, for example. They may then offer to
correct the defect for a fee. Grey hat hackers sometimes
find the defect of a system and publish the facts to the
world instead of a group of people. Even though grey
hat hackers may not necessarily perform hacking for
their personal gain, unauthorized access to a system
can be considered illegal and unethical.
3. Grey hat hackers
Just like a golden middle stage between white and
black hat hackers
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
10. Elite hacker –
social status among hackers, elite is used to describe the most skilled. Newly discovered
exploits circulate among these hackers. Elite groups such as Masters of Deception
conferred a kind of credibility on their members.
Script kiddies -
script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into
computer systems by using automated tools written by others (usually by other black hat
hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid,
child—an individual lacking knowledge and experience, immature),usually with little
understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is
someone who is new to hacking or preaching and has almost no knowledge or experience
of the workings of technology and hacking.
Blue hat –
blue hat hacker is someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft
also uses the term Blue Hat to represent a series of security briefing events. HacktivistA
hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or
political message.Hacktivism can be divided into two main groups:Cyberterrorism —
Activities involving website defacement or denial-of-service attacks; and,Freedom of
information — Making information that is not public, or is public in non-machine-
readable formats, accessible to the public.
12. Trojan
horses
A Trojan horse is a
program that seems to
be doing one thing but
is actually doing
another. It can be used
to set up a back door in
a computer system,
enabling the intruder to
gain access later. (The
name refers to the horse
from the Trojan War,
with the conceptually
similar function of
deceiving defenders into
bringing an intruder
into a protected area.)
Computer
virus
A virus is a self-
replicating program
that spreads by
inserting copies of itself
into other executable
code or documents. By
doing this, it behaves
similarly to a biological
virus, which spreads by
inserting itself into
living cells. While some
viruses are harmless or
mere hoaxes, most are
considered malicious.
Computer
worm
Like a virus, a worm is
also a self-replicating
program. It differs
from a virus in that
(a.) it propagates
through computer
networks without
user intervention; and
(b.) does not need to
attach itself to an
existing program.
Nonetheless, many
people use the terms
"virus" and "worm"
interchangeably to
describe any self-
propagating program.
13. 1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy—
are very popular with hackers.
2) Helba from the .hack manga and anime series
for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Books related with hacking -
14. Films
1) Antitrust
2) Cypher
3) Eagle Eye
4)Enemy of the State
5)Firewall
6)Girl With The Dragon
7)Tattoo
8)Hackers
9)LiveFree or Die Hard
10)The Matrix series
Etc.