Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Impact Of ICT “Hacking”

Similar presentations


Presentation on theme: "The Impact Of ICT “Hacking”"— Presentation transcript:

1 The Impact Of ICT “Hacking”
Prepared By : Name : Mohammad Sahrizan Bin Saldikun Class:4 c Teacher Name: Ismail Bin Hj Jaani

2 Content Solution Introduction Content Source Definition
Black Hat Hacker White Hat Hacker Grey Hat Hacker Elite Hat Hacker Content Overcome Hacking Through… Solution Bibliography Source

3 Definition During the 1990’s,the term hacking originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.

4 Type Of Hacker / At any Rates, Here Are The Type Of Hacker.
White Hat Black Hat Grey Hat

5 White Hat Hacker Someone who has non malicious intent whenever he break into security system , In fact , a large number of White Hacker are security expert themselves who wants to push the boundries.

6 Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.

7 Grey Hat Hacker The type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.

8 Conclusion Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.

9 Overcome Hacking Through …
Thing to do is keep your password a secret You need to make sure your computer doesn’t have viruses , trojans , keyloggers , etc. Keep your scripts and download program updates Doesn’t have a writable file permissions Never leave scripts on your account that are not being used.

10 Bibliography http://www.google.com http://www.wikipedia.com


Download ppt "The Impact Of ICT “Hacking”"

Similar presentations


Ads by Google