Download presentation
Presentation is loading. Please wait.
Published byAdrian Hill Modified over 9 years ago
1
Hacking by Tiffany Duff Computing in the Modern World Ms. Stewart
2
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Types of Hackers Cracker Phreaker Script Kiddie
3
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Cracker This person cracks or breaks into various items. This hacker can be cracking security codes, software registrations, or computer systems. This is generally the name the community gives for malicious hackers.
4
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Phreaker Phone hacker's and usually concentrate on understanding and manipulating the phone system. Phreakers can be malicious but are not always seen that way in the hacking community.
5
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Script Kiddie These individuals usually comb the Internet looking for pre-written scripts or programs they can use for various purposes. The individuals in this category are considered amateurs.
6
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Beneficial Hackers Considers their activities to be helping their industry and are often done with no compensation.
7
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Benefits to Hacking Rapid Advancement An inability to stagnate Diversification Innovation Continually improving security Product improvements Increased attention to consumer's needs Reliable, free software Free computer and software assistance
8
http://www.trdtechnical.com/eportfolio/Final_Project_Tina.pdf Drawbacks of Hacking Security breaches Steal ideas Financial losses for the company Fines for the perpetrator Lawsuit against the hacker
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.