Here // This is the presentation about to describe categories of Hackers. //In this session you will learn aims, identity and purposes of hackers >>> Enter.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
INTERNET SAFETY FOR STUDENTS
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Staying Safe Online Keep your Information Secure.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Computer Security By Duncan Hall.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Technical Implementation: Security Risks
Internet Safety.
Safety.
Seminar On Ethical Hacking Submitted To: Submitted By:
Scams & Schemes Common Sense Media.
3.6 Fundamentals of cyber security
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
How to use the internet safely and How to protect my personal data?
Handling Personal Data
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Threats By Dr. Shadi Masadeh.
How to build a good reputation online
Hackers and Crackers iJacsn.
Home Computer Security
The Impact Of ICT “Hacking”
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
Computer Security Elaine Munn Introduction to Computer Security.
Topic 5: Communication and the Internet
UNIT 18 Data Security 1.
Faculty of Science IT Department By Raz Dara MA.
The dark web By Riley. Sampare.
Introduction to Cybercrime and Security
What is computer hacking?
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Unit 1 Fundamentals of IT
Information Security.
Lesson 2- Protecting Yourself Online
Presentation transcript:

Here // This is the presentation about to describe categories of Hackers. //In this session you will learn aims, identity and purposes of hackers >>> Enter In DOS Command

Checking file system on C: The type of the file system is NTFS. A disk check has been scheduled. To skip disk checking. Press any key within 5 seconds(s).

Checking file system on C: The type of the file system is NTFS. A disk check has been scheduled. To skip disk checking. Press any key within 4 seconds(s).

Checking file system on C: The type of the file system is NTFS. A disk check has been scheduled. To skip disk checking. Press any key within 3 seconds(s).

Checking file system on C: The type of the file system is NTFS. A disk check has been scheduled. To skip disk checking. Press any key within 2 seconds(s).

The Presentation file is present here, Do you want to access ? Yes Deny Your presentation is being loaded. Press any key to continue...

Your presentation is loading Please wait…. Presentation loaded successfully. Name : Frelix.theme Subject : Categories of Hackers Fetch

Welcome to world of MindgamersCO5G-1 MGM’s Poly. Program Code: 33124

Be Aware…… You Have been Tracked Be Aware You are being Tracked...

Accessing Slide No.1, Please wait…. Accessing Slides are in progress…

Types of Hackers  Intruders Slide No. 1

Types of Hackers  There are are two types of hacking persons.  1.intruders 2.Insiders Types Of Hackers 1.Intruders 2.Insiders

Accessing Slide No.2, Please wait….

Categories of Hackers 1.Script Kiddie 2.White Hat 3.Black Hat 4.Grey Hat 5.Green Hat 6.Red Hat 7.Blue Hat

Script Kiddie Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.

Accessing Slide No. 3, Please wait….

Slide No. 3

White Hat Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

White Hat Works for good purpose. They don’t steal money or Formulas

Accessing Slide No. 4. Please wait…..

Slide No. 4

Black Hat Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.

We can say these are the bad Hackers Performs Stealing operation

Accessing Slide No. 5. Please wait…..

Slide No. 5

Grey Hat Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.

They just want Attention of People or Media Always try to be popular.

Accessing Slide No. 6. Please wait…..

Slide No. 6

Green Hat These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.

Tries Harder to hack More powerful technically

Accessing Slide No. 7. Please wait….

Slide No. 7

Red Hat These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

They do anything to complete their Purpose in which Killing is also included. They Performs Crimes like Getting money in form of Bitcoin.

Accessing Slide No. 8. Please wait….

Slide No. 8

Blue Hat If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

They live for Revenge Always tries something new to crack

Accessing Feedback link….

Thanks You deserves to be an good computer engineers Thankss You deserve to be an good computer engineers

Good Bye Fin

The End. System is Shutting Down……