0% found this document useful (0 votes)
14 views13 pages

Presentation 4

The document discusses the significance of Information Communication Technology (ICT) and the various types of hackers, including black hat, white hat, and grey hat hackers. It highlights the motivations behind hacking, the consequences such as financial losses and privacy issues, and provides real-life examples of cyber attacks. Additionally, it offers protective measures to safeguard against hacking and emphasizes the importance of being cautious while using ICT tools.

Uploaded by

mintyzzacc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views13 pages

Presentation 4

The document discusses the significance of Information Communication Technology (ICT) and the various types of hackers, including black hat, white hat, and grey hat hackers. It highlights the motivations behind hacking, the consequences such as financial losses and privacy issues, and provides real-life examples of cyber attacks. Additionally, it offers protective measures to safeguard against hacking and emphasizes the importance of being cautious while using ICT tools.

Uploaded by

mintyzzacc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

THE IMPLICATIONS

OF ICT
Hacking and hackers
Presentation by: Eman A. Halim
What is ICT?
■ ICT stands for Information
Communication Technology
■ It includes computers, the
internet, software, networks and
anything that helps us
communicate- Key Issues:
Why does ICT matter ?

■ICT is use in:


■Schools
■Businesses
■Governments
■And our daily lives.
Making it important to
understand its risks such as
What is hacking
■ Hacking means accesing
computer systems or networks
without permission, often to steal
or destroy data.
WHY DO PEOPLE
HACK?
Hackers may do this for financial
gain, to steal information, for
fun, or to cause damage.
This Photo by Unknown Author is licensed under CC BY-N
BLACK HAT
HACKERS
Illegal hackers who steal information,
cause damage, or make money from
cybercrime.
White Hat Hackers.
■Ethical hackers who are
hired to find and fix security
problems before bad
hackers can exploit them.

This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC B
Grey Hat Hackers.
■Hackers who
sometimes break the
law, but dont have
malicious intent, such
as hacking for research
This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-N

Consequences ■ Financial losses


■ Privacy Issues

of Hacking ■ Damage to reputation


■ Legal consequences
Real-Life
Examples.
(2017)
A cyber attack that affected
hospitals, businesses and
goverments worldwide,
locking their files and
demanding a ransom.

The Facebook Breach


(2018)
Hackers accessed personal
data of millions of facebook
This Photo by Unknown Author is licensed under CC BY

users without permission,


leading to privacy concerns.
How to protect against Hacking

■Use strong passwords


■Enable two factor authentication
(2FA)
■Keep software updated
■Be cautious with emails and links
Conclusion
■ Hacking is a serious issue that can
have financial ,personal,and societal
consequences.
What Can We Do ?
■ Protecty yourself online ,stay
informed,and always be cautious when
you using ICT tools and the internet.
Thank You
This Photo by Unknown Author is licensed under CC BY-SA

You might also like