We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19
COMPUTER HACKING
What is Computer Hacking?
Hacking is the act of identifying and then
exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data. Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime. Types Of Hackers TYPES OF HACKER
White hat hackers – sometimes also called “ethical
hackers” or “good hackers” – are the antithesis of black hats. They exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement. TYPES OF HACKER
A black hat - is a computer hacker who violates
laws or typical ethical standards for nefarious purposes, such as cybercrime, cyberwarfare or malice. The term originates from 1950s westerns, when bad guys typically wore black hats and good guys white hats. A black hat is contrasted with a white hat TYPES OF HACKER
A grey hat is a computer hacker or computer
security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into use in the late 1990s, and was derived from the concepts of "white hat" and "black hat" hackers. The Motivations for Hacking
Monetary gain is perhaps the most common reason
for hackers to attack an organization or an individual. In these cases, threat actors (often affiliated with cybercrime gangs) target companies they believe will pay a ransom to recover stolen information. Types Of Attack Types Of Attack
Keyloggers are a particularly insidious type of
spyware that can record and steal consecutive keystrokes (and much more) that the user enters on a device. The term keylogger, or “keystroke logger,” is self-explanatory: Software that logs what you type on your keyboard Types Of Attack
Denial-of-service attack is a cyber-attack in which
the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Types Of Attack
“Phishing” refers to an attempt to steal sensitive
information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information. Types Of Attack
Watering hole attack- is a security exploit that
compromises a site that a targeted victim visits to gain access to the victim's computer and network Types Of Attack
Impersonation attack- is a type of targeted
phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data from unsuspecting employees using social engineering tactics. Hackers attempt to trick the victim into transferring money, giving up sensitive information Types Of Attack
Pharming - is online fraud that involves the use of
malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data. Types Of Attack
Clickjacking - is an attack that tricks a user into
clicking a webpage element which is invisible or disguised as another element. Types Of Attack
Cookie theft -refers to a cyberattack where a
hacker gets access to the user's cookie data, small files websites store on the user's device. Cookie theft (also called cookie hijacking) can result in the attacker gaining access to the user's name, home address, telephone number, and other sensitive information. Types Of Attack
Man-in-the-middle attack - is a cyberattack where
the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties. Types Of Attack
Spyware - is malicious software that enters a user's
computer, gathers data from the device and user, and sends it to third parties without their consent. 6 easy tips to avoid Hacker
1. Maintain strong password.
2. Set up and us Multi-Factor Authentication. (MFA) 3. Be wary of suspicious emails. 4. Don’t open attachments in suspicious emails. 5. Install security updates for your system as soon as they lunch. 6. Avoid using public wifi.