hackers and crackers! a tiger claw presentation 003

19

Upload: lakshmanan-meiyappan

Post on 12-Jul-2015

879 views

Category:

Education


8 download

TRANSCRIPT

Page 1: Hackers and Crackers! A tiger Claw Presentation 003
Page 2: Hackers and Crackers! A tiger Claw Presentation 003

In Cyber security world, the person who is able to exploit the weakness in the system and

manages it to exploit it to accomplish his goal (either good or bad)

Is a

HACKER

Hacking?

Page 3: Hackers and Crackers! A tiger Claw Presentation 003

Script Kiddie

White Hat Hacker

Black Hat Hacker

Grey Hat Hacker

Hactivitist

Types of

hackers

Black Hat

Page 4: Hackers and Crackers! A tiger Claw Presentation 003

Script Kiddie

Script Kiddies

Page 5: Hackers and Crackers! A tiger Claw Presentation 003

• 1.Black hat

Black Hat

Page 6: Hackers and Crackers! A tiger Claw Presentation 003

• In summary, the term “Black hat" may refer toa hacker who:

• violates computer security for little reasonbeyond maliciousness or for personal gain

• Black hat hackers break into secure networksto destroy data or make the network unusablefor those who are authorized to use thenetwork.

Page 7: Hackers and Crackers! A tiger Claw Presentation 003

• White Hat

White Hat

Page 8: Hackers and Crackers! A tiger Claw Presentation 003

• In summary, the term “White hat" may referto a hacker who:

• The term "white hat" in Internet slang refersto an ethical hacker.

• breaks security for non-malicious reasons,perhaps to test their own security system orwhile working for a security company whichmakes security software.

Page 9: Hackers and Crackers! A tiger Claw Presentation 003
Page 10: Hackers and Crackers! A tiger Claw Presentation 003

• Grey hat

Grey Hat

Page 11: Hackers and Crackers! A tiger Claw Presentation 003

• In summary, the term "grey hat" may refer to ahacker who:

• Engages in security research with the intention tosecure rather than exploit

• Grapples with questions of ethics and law in theline of their work.

• Does not support full disclosure of vulnerabilities.

• Usually reports the vulnerability to the productvendor.

Page 12: Hackers and Crackers! A tiger Claw Presentation 003
Page 13: Hackers and Crackers! A tiger Claw Presentation 003
Page 14: Hackers and Crackers! A tiger Claw Presentation 003

HACKERS

Programers with Good intentionswho exploit the weakness.Not for any bad intentions

Page 15: Hackers and Crackers! A tiger Claw Presentation 003

CRACKERS

Programers with Negative intentionswho exploit the weakness.for many bad intentions

Page 16: Hackers and Crackers! A tiger Claw Presentation 003

cracking is Often Misunderstood as hacking

Malicious attack on computers is officially called

as cracking

Hacking truly applies to activities having good intentions

Page 17: Hackers and Crackers! A tiger Claw Presentation 003
Page 18: Hackers and Crackers! A tiger Claw Presentation 003
Page 19: Hackers and Crackers! A tiger Claw Presentation 003