0% found this document useful (0 votes)
81 views15 pages

Hacking Concepts Slides

The document provides an overview of hacking, defining it as the exploitation of system vulnerabilities for unauthorized access. It distinguishes between ethical hackers and various types of hackers, including black hats, white hats, and gray hats, and discusses the motivations behind hacking. Additionally, it highlights the impact of hacking on companies, including potential loss of customer information, revenue, and reputation.

Uploaded by

coderknowbody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views15 pages

Hacking Concepts Slides

The document provides an overview of hacking, defining it as the exploitation of system vulnerabilities for unauthorized access. It distinguishes between ethical hackers and various types of hackers, including black hats, white hats, and gray hats, and discusses the motivations behind hacking. Additionally, it highlights the impact of hacking on companies, including potential loss of customer information, revenue, and reputation.

Uploaded by

coderknowbody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Hacking Concepts

Dale Meredith
@dalemeredith | www.dalemeredith.com
“ Hacking is exploiting security controls
either in a technical, physical or a human-
based element

— Kevin Mitnick
Who? What? Where?

What is hacking?
What’s an Ethical Hacker?
Types of hackers?
Why do they hack?
How does hacking influence companies?
Hacking Defined:

Exploiting a Systems Vulnerabilities


and Security Controls to Gain Access
to System Resources and Features,
Outside the Creator's Original
Purpose.
History of Hacking

In the beginning…

§ 1970’s
§ 1980’s
§ 1990’s
§ 2000’s
History of Hacking

In the beginning… Currently…

§ 1970’s § DoS
§ 1980’s § Stock Manipulation
§ 1990’s § ID Theft / Credit Card Theft
§ 2000’s § Piracy
§ Theft of Services
§ Vandalism
Ethical Hacking Defined:

Involves the Use of Hacking Methods


and Tools to Discover Weaknesses for
System Security
What Skills Should an Ethical Hacker Have?

Expert with Proficient with Mastery with


Programs and Vulnerability Diverse Hacking Follow a Strict Code
Networks Research Techniques of Conduct
What Skills Should an Ethical Hacker Have?

Explicit Permissions Use the Same Report All of Your


in Writing Tactics & Strategies “No means NO!” Results
Types of Pen Tests

Black Box Gray Box White Box


Why a Hacker Hacks

Hobby Illegal Activities Malicious Intent Gain Knowledge


Types of Hackers

Black Hats White Hats Gray Hats

Spy Hackers / Cyber


Suicide Hackers Script Kiddies Terrorists / State
Sponsored Hackers
Hacktivism
Drive
Political / Social / Ideology / Vandalism /
Protest / Humiliate
Political Agenda
Defacing or Disabling Websites

Targets
Government Agencies
Multinational Corps
“Wrong”
How Does Hacking Influence Companies?

§ Customer private information


§ Intellectual property
§ Down time / slow site
§ Loss of revenues
§ Financial information
§ Reputation
§ Loss of business
Summary

q What is hacking?
q What’s an Ethical Hacker?
q Types of hackers?
q Why do they hack?
q How does hacking influence
companies?

You might also like