Hackers and Crackers! A tiger Claw Presentation 003

Download Hackers and Crackers! A tiger Claw Presentation 003

Post on 12-Jul-2015




8 download

Embed Size (px)


<p>PowerPoint Presentation</p> <p>In Cyber security world, the person who is able to exploit the weakness in the system and manages it to exploit it to accomplish his goal (either good or bad)Is a </p> <p>HACKER</p> <p>Hacking?Script KiddieWhite Hat HackerBlack Hat HackerGrey Hat HackerHactivitist</p> <p>Types of hackers</p> <p>Black Hat</p> <p>Script Kiddie</p> <p>Script Kiddies1.Black hat</p> <p>Black Hat</p> <p>In summary, the term Black hat" may refer to a hacker who:violates computer security for little reason beyond maliciousness or for personal gainBlack hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.White Hat</p> <p>White Hat</p> <p>In summary, the term White hat" may refer to a hacker who:The term "white hat" in Internet slang refers to anethical hacker. breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software.</p> <p>Grey hat</p> <p>Grey Hat</p> <p>In summary, the term "grey hat" may refer to a hacker who:Engages in security research with the intention to secure rather than exploitGrapples with questions of ethics and law in the line of their work.Does not support full disclosure of vulnerabilities.Usually reports the vulnerability to the product vendor.</p> <p>HACKERS</p> <p>Programers with Good intentionswho exploit the weakness.Not for any bad intentions</p> <p>CRACKERS</p> <p>Programers with Negative intentionswho exploit the weakness.for many bad intentions</p> <p>cracking is Often Misunderstood as hacking</p> <p>Malicious attack on computers is officially called as cracking</p> <p>Hacking truly applies to activities having good intentions</p> <p>ByLakshmanan</p>