0% found this document useful (0 votes)
48 views14 pages

And Ethical Hacking

The document discusses computer security, hacking, and ethical hacking. It defines computer security as protecting systems from theft, damage, and disruption. Hacking involves stealing private data without consent, while ethical hacking performs similar tests with an owner's permission. There are different types of hackers like white hats who help organizations, black hats who hack maliciously, and grey hats in between. The document lists some notorious past hackers and their illegal activities, showing hacking can have serious legal consequences.

Uploaded by

Osama Shn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views14 pages

And Ethical Hacking

The document discusses computer security, hacking, and ethical hacking. It defines computer security as protecting systems from theft, damage, and disruption. Hacking involves stealing private data without consent, while ethical hacking performs similar tests with an owner's permission. There are different types of hackers like white hats who help organizations, black hats who hack maliciously, and grey hats in between. The document lists some notorious past hackers and their illegal activities, showing hacking can have serious legal consequences.

Uploaded by

Osama Shn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Hacking

And ethical hacking


 The definition of online security:

 Computer security,
cybersecurity, or information
technology security (IT
security) is the protection of
computer systems from theft or
damage to their hardware,
software or electronic data, as
well as from disruption or
misdirection of the services they
provide.
 The difference between security and
protection:
 Security and protection are very close concepts , but are not the
same.
 Security measures are adopted to increase the level of protection.
 The feeling of protection arises when one has enough security
measures.
 Security is a type of protection against external threats.
Overview of hacking:

 Hacking is the act of stealing personal or private data, without the


owner's knowledge or consent, it could also include other things like
stealing passwords, creating a bot net, or pretty much any act that
breaches someone's privacy, without their knowledge, or consent.
 The difference between a hacker and a cracker, is that a hacker is
someone that uses their extensive knowledge of computer logic and
codes for malicious purposes, while a cracker - looks for back doors in
programs, and exploits those back doors.
 Cracking is generally less harmful than hacking.
Hacking and ethical hacking:

 Hacker
• Access computer system or network without authorization.
• Breaks the law.

 Ethical Hacker
• Performs most of the same activities but with
owner’s permission. • Employed by companies to perform
Penetration Tests.
Types of hackers:

1. White hat hackers:


• Also known as ethical hackers.
• Help governments and organizations.
• Ensure protection from black hat hackers.

2. Black hat hackers:


• Use their skill maliciously for personal gain.
• Hack banks, steal credit cards and deface websites.
3. Grey hat hackers:
• Combination of white and black hat hackers.
• Don’t hack for personal gain.
• Aren’t legally authorized to hack the organizations’ cybersecurity.

4. Script kiddies:
• Amateur hackers.
• Their primary purpose is to impress their friends or gain attention.
10 most notorious hackers in the world:

1. Gary Mckinnon
 He infiltrated 97 US military and NASA computers, by installing a virus and
deleting a few files.
 The biggest military computer hack of all time!

2. LulzSec
 Black Hat hacker group, gained credentials for hacking into Sony, News
International, CIA, FBI, Scotland Yard, and several noteworthy accounts.
 Many claim that this group had taken it upon itself to create awareness about
the absence of efficient security against hackers.
3. Adrian Lamo
 He hacked into Yahoo!, Microsoft, Google, and The
New York Times.

4. Mathew Bevan and Richard Pryce


 what Mathew Bevan along with his alleged partner
Richard Pryce did, could have triggered great many
issues between USA and North Korea.
 The duo hacked the US military computers and used it
as a means to infiltrate the foreign systems.
5. Jonathan James
 The first juvenile to be imprisoned for a cyber-crime at
the age of 16.
 Hacked into Defense Threat Reduction Agency of US
department.
 had a bitter ending as James committed suicide in 2008.

6. Kevin Poulsen
 Poulsen infiltrated a radio shows call-in contest just so he
could win a Porsche.
 was found guilty of seven counts of mail, wire and
computer fraud, money laundering and the likes.
7. Kevin Mitnick
 convicted of hacking Nokia, Motorola and
Pentagon.
 He pleaded guilty to seven counts of fraud that
included wire fraud, computer fraud and of
illegally interception a wire communication.

8. Anonymous
 have publicized themselves by attacking the
government, religious and corporate websites.
 The Vatican, the FBI, the CIA, PayPal, Sony,
Mastercard, Visa, Chinese, Israeli, Tunisian, and
Ugandan governments have been amongst their
targets.
9. Astra
 A 58-year-old Greek Mathematician hacked
into the systems of France’s Dassault Group,
stole vulnerable weapons technology data
and sold it to different countries for five long
years.

10. Albert Gonzalez


 stole from credit cards of the netizens.
 This was recorded to be the biggest credit
card theft in the history of mankind. He
resold approximately 170 million credit cards
and ATM numbers.
 When arrested, Gonzalez was sentenced to
20 years in Federal prison.
Done by :
Judy Abdullah

You might also like