1 / 4

hacker

PARTFOLIO: BY GROUP. MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934. hacker. Hacker A person who maliciously cracks software and or passwords. Hacking

diep
Télécharger la présentation

hacker

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934 hacker

  2. Hacker • A person who maliciously cracks software and or passwords. • Hacking • means finding out weaknesses in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks. • Cracker • someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security

  3. White hat A white hat cracker breaks security for non-malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration test and vulnerability assessment  within a contractual agreement. Black hat A Black Hat Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"(Moore,2005).Black Hat Hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network Classifications hackers

  4. Techniques • Vulnerability scanner • Password cracking • Packet sniffer • Phishing • Rootkit

More Related