Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

UNIT 20 The ex-hacker.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Internet Safety/Cyber Ethics
e-safety and cyber bullying
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Internet Security Passwords.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Introduction Our Topic: Mobile Security Why is mobile security important?
BY AISLING PHILPOTT e-safety. S s can be dangerous because you could Fall victim to a scam for money. you could fall for someone wanting to.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Online Safety Written by: Asael Estrada. Usernames & Passwords Never give out your username or password. You shouldn’t give it out because someone might.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
INTERNET SAFETY & POWERFUL PASSWORDS For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer crimes.
INTRODUCTION & QUESTIONS.
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Best ways to Hack Facebook Account Now a days Facebook becomes the number 1 social networking portal that touches every one’s life. People are now a days.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Technical Implementation: Security Risks
Scams & Schemes Common Sense Media.
3.6 Fundamentals of cyber security
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Hackers and Crackers iJacsn.
The Impact Of ICT “Hacking”
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Teaching Computing to GCSE
Introduction to Computers
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Presentation transcript:

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?

In your groups… Have a chat about what you think the difference is between black, white and grey hat hackers.

Black Hat Hackers Black hat hackers/black hats are the type of hacker most often mentioned in the media. They break into computers for personal gain (e.g. to steal credit card numbers). They break into computers for malicious reasons (e.g. using a botnet they've created to perform DDoS attacks on websites they don't like). If they found a zero day, they would sell it to criminal organisations on the black market or use it to compromise computer systems.

Zero Day A Zero Day is a weakness in a website that the owners don’t know about yet. They can allow black hats to do serious damage.

White hat hackers White hat : the opposite of black hat hackers: 'ethical hackers'. Experts who use their abilities for good, ethical and legal purposes. They break into computers because they have permission to find weaknesses. Instead of using their access to steal or vandalise, the white hat reports back to the organisation and helps them improve their defenses (penetration testing). If they found a zero day, they would tell the developer, allowing them to patch their product and improve its security before it's compromised. Organisations often pay 'bounties' to white hats for their work.

Grey hat hackers Fall somewhere between a black hat and a white hat. Don't work for their own gain or to cause carnage but may technically commit crimes and do arguably unethical things. Might attempt to break into a computer system without permission then inform the organisation afterwards, allowing them to fix the problem. Grey hats might not use their access for bad purposes but they still compromise cyber security without permission, which is illegal. If a grey hat discovered a security flaw, they might try to sell it to the organisation or might disclose it to the public; it's difficult to know.

1) You guess someone’s password for their iCloud account and you purchase some apps using their account details. 4) You discover a vulnerability on your school’s website that allows you to change all your report grades to As. You change your grades. 7) Your friend leaves their account unlocked and you send an pretending to be them. 2) You guess your friend’s Facebook password and sign into their account but you tell them what you’ve done. 5) You find a zero day on Twitter that allows you to post as someone else and you post the zero day on one of Twitter’s public forums. 8) Your friend shows you their new facial recognition feature on their phone and you demonstrate how you can use a photo of them to gain access. 3) Your school gives you permission to use your cyber skills to search for weaknesses in the school system. You report back what you find and don’t tell anyone else. 6) You have a bet with your friend that you can hack into their account and when you do it you immediately log out and tell them. 9) After leaving school, you get a job as a pen tester.

1) You guess someone’s password for their iCloud account and you purchase some apps using their account details. 4) You discover a vulnerability on your school’s website that allows you to change all your report grades to As. You change your grades. 7) Your friend leaves their account unlocked and you send an pretending to be them. 2) You guess your friend’s Facebook password and sign into their account but you tell them what you’ve done. 5) You find a zero day on Twitter that allows you to post as someone else and you post it on one of Twitter’s public forums. 8) Your friend shows you their new facial recognition feature on their phone and you demonstrate how you can use a photo of them to gain access. 3) Your school gives you permission to use your cyber skills to search for weaknesses in the school system. You report back what you find and don’t tell anyone else. 6) You have a bet with your friend that you can hack into their account and when you do it you immediately log out and tell them. 9) After leaving school, you get a job as a pen tester. BLACK GREY WHITE