The Impact Of ICT “Hacking” Prepared By : Name : Mohammad Sahrizan Bin Saldikun Class:4 c Teacher Name: Ismail Bin Hj Jaani
Content Solution Introduction Content Source Definition Black Hat Hacker White Hat Hacker Grey Hat Hacker Elite Hat Hacker Content Overcome Hacking Through… Solution Bibliography Source
Definition During the 1990’s,the term hacking originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.
Type Of Hacker / At any Rates, Here Are The Type Of Hacker. White Hat Black Hat Grey Hat
White Hat Hacker Someone who has non malicious intent whenever he break into security system , In fact , a large number of White Hacker are security expert themselves who wants to push the boundries.
Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.
Grey Hat Hacker The type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.
Conclusion Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.
Overcome Hacking Through … Thing to do is keep your password a secret You need to make sure your computer doesn’t have viruses , trojans , keyloggers , etc. Keep your scripts and download program updates Doesn’t have a writable file permissions Never leave scripts on your account that are not being used.
Bibliography http://www.google.com http://www.wikipedia.com http://www.secpoint.com/types-of-hacker.html