Download presentation
Presentation is loading. Please wait.
Published byCrystal Clarke Modified over 8 years ago
1
Logan Wojcik COSC 101
2
Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems
3
Black Hats ~ Hackers with the intent to exploit breaches and attack network systems ~Term originates from Old Western films ~Purposes include stealing data for future use or destroying files
4
~ Hackers who help operating systems become more secure ~Point out breaches in operating systems to protect them from black hackers ~Many white hats do their work as a hobby, while others work for a fee White Hats
5
Black Hats ~Jonathan James- shut down NASA’s systems as a 16-year old - stole approximately $1.7 million in software ~Adrian Lamo- broke into the New York Times’ intranet - stole numerous social security numbers White Hats ~Steve Wozniak- co-founder of Apple - helped make the first PC board ~Tim Berners-Lee (pictured)- founder of the World Wide Web - got his start hacking computers at Oxford Famous Black & White Hats
6
~Two major sections: Black Hat Briefings and Black Hat Trainings ~Briefings include speeches from famous hackers, federal officials and agents ~Trainings include different seminars from Cisco Systems, Offensive Security, and the US government Black Hat Conference
7
~ Fall in between white and black hats ~Hack computer systems to assist companies, but gain illegal access ~Very few throughout the world; one of the most famous is Escher Auernheimer (pictured) Grey Hats
8
~Both black hats and white hats can create problems ~White hats are former black hats who have turned good ~Agencies rely on hackers to take down other hackers Conclusion
9
Bibliography
10
Bibliography (continued)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.