Computer and Internet hacking
-
Upload
hariharan-sivadasan -
Category
Education
-
view
58 -
download
3
Transcript of Computer and Internet hacking
![Page 1: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/1.jpg)
COMPUTER AND INTERNET HACKING
![Page 2: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/2.jpg)
HACKING
Modifying Computer Hardware and software to accomplish a goal outside
of creator’s original purpose
![Page 3: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/3.jpg)
HACKERS Very good
understanding of computers
Knows in
and outs of Internet
Possess an ability
to indulge in criminal activity
![Page 4: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/4.jpg)
![Page 5: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/5.jpg)
Hacker- Computer Security
Hacker- Hobbyist
Hacker-Programmer Subculture
![Page 6: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/6.jpg)
Hacker Types
• White Hat • Grey Hat• Black Hat
![Page 7: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/7.jpg)
White Hat
They’re the “ethical hackers,” experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes rather than bad, unethical, and
criminal purposes.
![Page 8: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/8.jpg)
Grey Hat
A gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes
and do arguably unethical things.
![Page 9: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/9.jpg)
Black Hat
Black hats fit the widely-held stereotype that hackers are criminals performing illegal activities for personal
gain and attacking others. They’re the computer criminals.
![Page 10: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/10.jpg)
Attacks
Internet-Connected System.Network EnumerationVulnerability analysis
Exploitation
![Page 11: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/11.jpg)
![Page 12: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/12.jpg)
![Page 13: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/13.jpg)
Hacker Inside!!!
![Page 14: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/14.jpg)
![Page 15: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/15.jpg)
So!!!!!!!!!!!!
![Page 16: Computer and Internet hacking](https://reader036.fdocuments.us/reader036/viewer/2022062401/58ef7f801a28abfe5b8b458b/html5/thumbnails/16.jpg)