SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Group 7 : Hacker 
Nguyễn Thị Thanh Huyền 
Trần Thị Luyến 
Nguyễn Linh Hương 
Phạm Thị Tiệp
HACKER 
1. Definition and general information 
2. Types of hackers 
3. How to prevent hackers 
4. Hackers in Vietnam
DEFINITION 
Hacker: 
 A clever programmer 
 Breaking into computer systems 
 Hacker => write + edit software 
(programming, administration and 
security) 
=> understand the operation 
of the computer system, network 
=> alter, modify with many 
different good and bad purposes
Why Do Hackers Hack?
1. Hacking for fun: The personal gratification or the 
challenge 
2. Use your computer: 
+ Impersonate to discuss openly things not on their own 
servers 
+ Store illicit material (pornography, pirated music, 
pirated software etc.) => not lead to their own computer. 
3. Hacking to steal: steal information or money (Banks and 
companies or specific person's) 
4. Hacking to disrupt: disrupt business, create chaos
Types of hackers 
1. White hat hackers 
2. Black hat hackers 
3. Grey hat hackers 
4. Other types
Black hat hackers 
 Crackers have malicious intents when breaking 
into security systems. 
 Using of technology such 
as a network, phone system 
or computer without 
authorization .
Black hat hackers 
 Malevolent purposes can range from all 
sorts cyber crimes: 
Crimes 
Piracy 
vandalism 
Identity theft 
Credit card fraud 
Exploits : virus, worms, 
Trojans, ect
McKinnon- the most notorious 
Black Hat Hacker in the world
White hat hackers 
 Security professionals, known as ethical 
hackers, break into security systems to 
protect them .
White hat hackers 
 Ethical hackers provide a company : 
An executive summary describing the 
potential risks on their ICT system 
A prioritized list of recommended steps that should 
be taken to eliminate the risks and strengthen 
system 
A technical summary of existing security gaps 
A detailed report on the assessment
White hat hackers 
 Khalil, Palestinian hacker, found a 
serious flaw on Facebook
Grey hat hackers
Grey hat hackers 
 Exhibiting traits from both white and 
black hat hackers. 
 Like white hat: 
 informing administrator of the website 
some vulnerabilities . 
 Like black hat: 
 hacking and siting freely without 
authorization from owners.
HOW TO PREVENT 
HACKER 
 Use anti-virus software 
 Use anti-spyware program on your 
system 
 Install a firewall on your computer 
 Often change your passwords 
 Delete emails from unknown sources 
 Always be aware
HOW TO PREVENT 
HACKER 
 Use anti-virus software
HOW TO PREVENT 
HACKER 
 Use anti-spyware program on your 
system
HOW TO PREVENT 
HACKER 
 Install a firewall on your computer
HOW TO PREVENT 
HACKER 
 Often change your passwords
HOW TO PREVENT 
HACKER 
 Delete emails from unknown sources
HOW TO PREVENT 
HACKER 
 Always be aware
Hit network attacks inVietnam 
 website of education and training 
under attack 
 P.A ( register domain names) under 
attack 
 network newspaper under attack
Website of education and 
training 
 www.moet.gov.vn is hacked 
 minister Nguyen Thien Nhan photo by 
photo-naked man 
 5 P.A fixing the errors =>> running 
normally 
 culprit: Nguyen Minh Tri - twelfth grade
P.A ( register domain names) 
 27/7/2008 websites of company, 
organization… not accessed 
 2nd day, number of fault websites 
increasing 
 8000 web pages neutralized
Network newspaper 
 6/2013 intellectual newspaper, 
Vietnam net…. attacked DDOS 
 method: install malicious code on 
computer => attack DDOS => result in 
overload => deny access 
 BKAV + CMC Infosec => end the 
problem 
 no – known culprit
Super hackers in Vietnam 
 The first hacker : Nguyen Van Phi 
Hung 
- 19/5/2004 courted Singapore 
- method: Online game set Trojan => 
held personal information => steal 638 
USD
Super hacker in Vietnam 
 be decoyed to go oversea and be 
arrested by US agents: Ngo Minh Hieu 
 method: sell personal information ( 
2007-2013)
Game 
1. The crime of intentionally damaging property 
belonging to other people. 
2. A ridiculous, hypocritical, or pretentious 
ceremony or performance. 
3. Intended to harm or upset other people. 
4. Unsolicited advertising or promotional material 
received through the post. 
5. Pretend to be (another person) 
for entertainment or fraud. 
6. Complete disorder and confusion 
7. Pleasure, especially when gained from 
the satisfaction of a desire. 
8. A person or thing used 
to mislead or lure someone into a trap.
Key 
1. Vandalism 
2. Mummery 
3. Malicious 
4. Junk-mail 
5. Impersonate 
6. Chaos 
7. Gratification 
8. decoy
Summary 
1. Definition and general information 
2. Types of hackers 
3. How to prevent hackers 
4. Hackers in Vietnam
reference 
 http://www.howtogeek.com/157460/ha 
cker-hat-colors-explained-black-hats-white- 
hats-and-gray-hats/ 
 http://www.hackersonlineclub.com/hac 
kers-types 
 http://www.youtube.com/watch?v=eK 
mATihzSTA
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần

Weitere ähnliche Inhalte

Was ist angesagt?

Sit presentation
Sit presentationSit presentation
Sit presentation
cchoi02
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
Elizabeth Hall
 

Was ist angesagt? (19)

Hacking
HackingHacking
Hacking
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
Hacking Hacking
Hacking
 
My presentation
My presentationMy presentation
My presentation
 
Hacking
HackingHacking
Hacking
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
File000145
File000145File000145
File000145
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 

Andere mochten auch

Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenes
vanessavergara18
 
Sayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful DesignSayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful Design
Sayed Minhal
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
kb candipuro
 
Linked in Master
Linked in MasterLinked in Master
Linked in Master
Simon Dear
 
Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...
Joshua Owolabi
 
Mesopotamia ciudades de estado
Mesopotamia ciudades de estadoMesopotamia ciudades de estado
Mesopotamia ciudades de estado
vanessavergara18
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 

Andere mochten auch (20)

MPW - Management of self
MPW - Management of selfMPW - Management of self
MPW - Management of self
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenes
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
Sayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful DesignSayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful Design
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
 
Linked in Master
Linked in MasterLinked in Master
Linked in Master
 
Y'ems Group's Social Networking for Organizations Ver 1.0
Y'ems Group's Social Networking for Organizations Ver 1.0Y'ems Group's Social Networking for Organizations Ver 1.0
Y'ems Group's Social Networking for Organizations Ver 1.0
 
E4
E4E4
E4
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Company Profile - UBWebs
Company Profile - UBWebsCompany Profile - UBWebs
Company Profile - UBWebs
 
How to Do the Carb Nite Dieting
How to Do the Carb Nite DietingHow to Do the Carb Nite Dieting
How to Do the Carb Nite Dieting
 
Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mesopotamia ciudades de estado
Mesopotamia ciudades de estadoMesopotamia ciudades de estado
Mesopotamia ciudades de estado
 
"La familia Mengin en su formidable propiedad Lafitte" - Hola.com
"La familia Mengin en su formidable propiedad Lafitte" - Hola.com"La familia Mengin en su formidable propiedad Lafitte" - Hola.com
"La familia Mengin en su formidable propiedad Lafitte" - Hola.com
 
Tips for throwing a DIY Birthday party
Tips for throwing a  DIY Birthday partyTips for throwing a  DIY Birthday party
Tips for throwing a DIY Birthday party
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Social Media and (Urban) Social Protest: The Brazilian Experience
Social Media and (Urban) Social Protest: The Brazilian ExperienceSocial Media and (Urban) Social Protest: The Brazilian Experience
Social Media and (Urban) Social Protest: The Brazilian Experience
 
Acropolis griegas
Acropolis griegasAcropolis griegas
Acropolis griegas
 
E2
E2E2
E2
 

Ähnlich wie Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 

Ähnlich wie Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần (20)

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking
HackingHacking
Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 

Kürzlich hochgeladen

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Kürzlich hochgeladen (20)

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 

Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần

  • 1. Group 7 : Hacker Nguyễn Thị Thanh Huyền Trần Thị Luyến Nguyễn Linh Hương Phạm Thị Tiệp
  • 2. HACKER 1. Definition and general information 2. Types of hackers 3. How to prevent hackers 4. Hackers in Vietnam
  • 3. DEFINITION Hacker:  A clever programmer  Breaking into computer systems  Hacker => write + edit software (programming, administration and security) => understand the operation of the computer system, network => alter, modify with many different good and bad purposes
  • 5. 1. Hacking for fun: The personal gratification or the challenge 2. Use your computer: + Impersonate to discuss openly things not on their own servers + Store illicit material (pornography, pirated music, pirated software etc.) => not lead to their own computer. 3. Hacking to steal: steal information or money (Banks and companies or specific person's) 4. Hacking to disrupt: disrupt business, create chaos
  • 6. Types of hackers 1. White hat hackers 2. Black hat hackers 3. Grey hat hackers 4. Other types
  • 7.
  • 8. Black hat hackers  Crackers have malicious intents when breaking into security systems.  Using of technology such as a network, phone system or computer without authorization .
  • 9. Black hat hackers  Malevolent purposes can range from all sorts cyber crimes: Crimes Piracy vandalism Identity theft Credit card fraud Exploits : virus, worms, Trojans, ect
  • 10. McKinnon- the most notorious Black Hat Hacker in the world
  • 11. White hat hackers  Security professionals, known as ethical hackers, break into security systems to protect them .
  • 12. White hat hackers  Ethical hackers provide a company : An executive summary describing the potential risks on their ICT system A prioritized list of recommended steps that should be taken to eliminate the risks and strengthen system A technical summary of existing security gaps A detailed report on the assessment
  • 13. White hat hackers  Khalil, Palestinian hacker, found a serious flaw on Facebook
  • 14.
  • 16. Grey hat hackers  Exhibiting traits from both white and black hat hackers.  Like white hat:  informing administrator of the website some vulnerabilities .  Like black hat:  hacking and siting freely without authorization from owners.
  • 17. HOW TO PREVENT HACKER  Use anti-virus software  Use anti-spyware program on your system  Install a firewall on your computer  Often change your passwords  Delete emails from unknown sources  Always be aware
  • 18. HOW TO PREVENT HACKER  Use anti-virus software
  • 19. HOW TO PREVENT HACKER  Use anti-spyware program on your system
  • 20. HOW TO PREVENT HACKER  Install a firewall on your computer
  • 21. HOW TO PREVENT HACKER  Often change your passwords
  • 22. HOW TO PREVENT HACKER  Delete emails from unknown sources
  • 23. HOW TO PREVENT HACKER  Always be aware
  • 24. Hit network attacks inVietnam  website of education and training under attack  P.A ( register domain names) under attack  network newspaper under attack
  • 25. Website of education and training  www.moet.gov.vn is hacked  minister Nguyen Thien Nhan photo by photo-naked man  5 P.A fixing the errors =>> running normally  culprit: Nguyen Minh Tri - twelfth grade
  • 26. P.A ( register domain names)  27/7/2008 websites of company, organization… not accessed  2nd day, number of fault websites increasing  8000 web pages neutralized
  • 27. Network newspaper  6/2013 intellectual newspaper, Vietnam net…. attacked DDOS  method: install malicious code on computer => attack DDOS => result in overload => deny access  BKAV + CMC Infosec => end the problem  no – known culprit
  • 28. Super hackers in Vietnam  The first hacker : Nguyen Van Phi Hung - 19/5/2004 courted Singapore - method: Online game set Trojan => held personal information => steal 638 USD
  • 29. Super hacker in Vietnam  be decoyed to go oversea and be arrested by US agents: Ngo Minh Hieu  method: sell personal information ( 2007-2013)
  • 30. Game 1. The crime of intentionally damaging property belonging to other people. 2. A ridiculous, hypocritical, or pretentious ceremony or performance. 3. Intended to harm or upset other people. 4. Unsolicited advertising or promotional material received through the post. 5. Pretend to be (another person) for entertainment or fraud. 6. Complete disorder and confusion 7. Pleasure, especially when gained from the satisfaction of a desire. 8. A person or thing used to mislead or lure someone into a trap.
  • 31. Key 1. Vandalism 2. Mummery 3. Malicious 4. Junk-mail 5. Impersonate 6. Chaos 7. Gratification 8. decoy
  • 32. Summary 1. Definition and general information 2. Types of hackers 3. How to prevent hackers 4. Hackers in Vietnam
  • 33. reference  http://www.howtogeek.com/157460/ha cker-hat-colors-explained-black-hats-white- hats-and-gray-hats/  http://www.hackersonlineclub.com/hac kers-types  http://www.youtube.com/watch?v=eK mATihzSTA