1 / 39

Types of Hackers

Types of Hackers. What’s a hacker?. Someone who exercises playful ingenuity Misusers of the internet who try to obtain or corrupt information; people who try to prevent it. White Hat Hacker. People who are hired by companies to hack into the company’s system. Black Hat Hackers.

max
Télécharger la présentation

Types of Hackers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Types of Hackers

  2. What’s a hacker? • Someone who exercises playful ingenuity • Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.

  3. White Hat Hacker • People who are hired by companies to hack into the company’s system

  4. Black Hat Hackers • Specialize in illegal penetration of systems. • Motivated by profit, fun, or political motivation

  5. Types of Harmful Programs

  6. Virus • Definition: A program that attaches to another program or file on your computer, allowing it to spread and infect other computers

  7. Viruses • Viruses range in severity • Some annoy, others damage software and hardware • Spread by sharing files and emailing infected files to others. Could happen unknowingly.

  8. Worms • Like viruses, but they spread without human action. • Replicate themselves • It is possible for someone • to use a worm to control • your computer remotely

  9. Trojan Horses • Appears to be useful software, but damages computer once run. • Results vary, but they don’t replicate nor infect other files.

  10. Blended Threat • Worst security risk • Blends effects of viruses, worms, and Trojan Horses • Attack system from multiple points • Don’t have to be opened by user

  11. Negative Aspects of Hacking

  12. Damage to Websites -Hackers can edit or deface websites -Some are called “Hacktivists” -Targets mostly include Corporate and Govt. Websites

  13. International -Some governments allegedly hack other gov’t websites -Reasons include: 1. Espionage 2. Cyber-Warfare 3. Theft of Technology or Information

  14. Consequences -Websites may be deleted -Harder now with new security

  15. Risks to Users -Identity Theft -Info obtained from online vendors -Hacker may sell info

  16. Lockheed Martin -Security contractor RSA was hacked -Employee passwords stolen -Hacker almost gained access to personnel files

  17. WEP Key Theft -Relevant to YOU -WEP Key= wireless network security -Stolen internet -Negative effect on internet subscriber

  18. Anonymous -Hacker group -Freedom of Information -Plotting to take Facebook offline -Don’t like Scientology

  19. Positive Effects of Hacking

  20. White Hat Hackers • “White hat hackers are programmers who break into computer systems for the sake of exposing security flaws, instead of exploiting them for malevolent purposes.”

  21. Why are they good? • They report their discoveries to their employer so that the software can be made more secure • This helps protect our information

  22. Examples • TinKode – discovered security flaws in NASA’s military satellites • Rent-a-Hacker, Inc. – hacking at reasonable rates! • But they’ll only hack your OWN software

  23. Hacktivism • Hacking is used to fight against oppressive governments and give the public a voice • Particularly in authoritarian countries like China and Iran

  24. Hacktivism in Iran • During the 2009 presidential elections, Ahmedinejad shut off Internet for people supporting rival candidates • Iran also has a firewall blocking any “Western” media

  25. Hacktivism in Iran • Iranians responded with Denial of Service attacks and hacking of government websites to expose their plight • the program Haystack allowed circumvention of the firewall

  26. The Church’s View on Hacking

  27. As we go through this presentation, keep in mind that the church does not have specific view on hacking. • There is no published statement

  28. that says how they feel so we will look at what the bible says about things such as stealing and invasion on ones trust

  29. in order to get a sense of how the church feels about hacking.

  30. The 7th commandment • “The seventh commandment forbids unjustly taking or keeping the goods of one's neighbor and wronging him in any way with

  31. The 7th commandment • respect to his goods.”

  32. The 7th commandment • Hackers often steal things that many people have put a lot of work into and thus are violating the 7th commandment.

  33. The 7th commandment • “It commands justice and charity in the care of earthly goods and the fruits of men's labor.”

  34. The 7th commandment • Hackers violate privacy when they hack into government databases to steal files, which is a crime punishable by strict consequences.

  35. Hackers = Thieves • Whether it’s embezzling, stealing ideas, hacking into personal accounts, stealing money, or stealing national documents hackers are thieves.

  36. Conclusion

  37. Can Hacking Be Justified? • In the case of white hat hackers – yes • But white hats wouldn’t be necessary if black hats didn’t exist

  38. Ultimately, as the Catholic Church says, hacking IS a violation of integrity and can be seen as thievery • It should be condemned

  39. In its essence, it is thievery of information and privacy, and the Church condemns that. • But it’s ultimately up to you to decide

More Related