1 / 10

The Impact Of ICT “ Hacking”

The Impact Of ICT “ Hacking”. Prepared By : Name : Mohammad Sahrizan Bin Saldikun C lass:4 c Teacher Name: Ismail Bin Hj Jaani. Content. Definition.

nariko
Télécharger la présentation

The Impact Of ICT “ Hacking”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Impact Of ICT“Hacking” Prepared By : Name : Mohammad Sahrizan Bin Saldikun Class:4 c Teacher Name: Ismail Bin HjJaani

  2. Content

  3. Definition • During the 1990’s,the term hacking originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.

  4. Type Of Hacker / At any Rates, Here Are The Type Of Hacker. • White Hat • Black Hat • Grey Hat

  5. White Hat Hacker Someone who has non malicious intent whenever he break into security system , In fact , a large number of White Hacker are security expert themselves who wants to push the boundries.

  6. Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.

  7. Grey Hat Hacker The type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.

  8. Conclusion Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.

  9. Overcome Hacking Through …

  10. Bibliography • http://www.google.com • http://www.wikipedia.com • http://www.secpoint.com/types-of-hacker.html

More Related