Download presentation
Presentation is loading. Please wait.
1
The Impact Of ICT “Hacking”
Prepared By : Name : Mohammad Sahrizan Bin Saldikun Class:4 c Teacher Name: Ismail Bin Hj Jaani
2
Content Solution Introduction Content Source Definition
Black Hat Hacker White Hat Hacker Grey Hat Hacker Elite Hat Hacker Content Overcome Hacking Through… Solution Bibliography Source
3
Definition During the 1990’s,the term hacking originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.
4
Type Of Hacker / At any Rates, Here Are The Type Of Hacker.
White Hat Black Hat Grey Hat
5
White Hat Hacker Someone who has non malicious intent whenever he break into security system , In fact , a large number of White Hacker are security expert themselves who wants to push the boundries.
6
Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.
7
Grey Hat Hacker The type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.
8
Conclusion Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.
9
Overcome Hacking Through …
Thing to do is keep your password a secret You need to make sure your computer doesn’t have viruses , trojans , keyloggers , etc. Keep your scripts and download program updates Doesn’t have a writable file permissions Never leave scripts on your account that are not being used.
10
Bibliography http://www.google.com http://www.wikipedia.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.