SlideShare uma empresa Scribd logo
1 de 15
Pranav patade
Hacking
Advantages
Keep us alert
about our safety
Can be used to
recover lost
information
where the
computer
password has
been lost
Disadvantages Criminal can use
it & harm privacy
Although hacking is most often associated in
the popular consciousness with one code
breaker breaking into a computer to steal data
or wreak havoc, the word is used in a variety of
senses. Within tech communities, the word
often refers to "hacking together" a quick
program to solve a problem creatively. hacking
someone account is disrespecting some ones
privacy.
What is hacking?
Hackers do what they do using a variety of
methods. They're usually adept at working with
computers, which makes them good at finding
security vulnerabilities. Another way that
hackers get data that is seldom discussed is
called "social engineering." Social engineering is
a private investigator-like way of getting data;
you pose as someone you're not on the phone or
in an email to get the information you need.
How is hacking done?
Not all hackers are bad. Many work for good in
a variety of ways. "White hat" hackers are
hackers that work to either expose
vulnerabilities in computer systems so they can
be repaired or exploit vulnerabilities in
organizations they dislike as a form of activism.
Although hacking really is isn't as glamorous as
it is in the movies, the reality is a lot more
interesting. There's clearly more to it than lone
code breakers breaking into government
computer systems overnight.
Are all hackers bad?
1. White hat hackers -
source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29
Struan Robertson, legal director at Pinsent Masons LLP, and editor of
OUT-LAW.com, says "Broadly speaking, if the access to a system is
authorized, the hacking is ethical and legal. If it isn't, there's an
offence under the Computer Misuse Act. The unauthorized access
offence covers everything from guessing the password, to accessing
someone's webmail account, to cracking the security of a bank. The
maximum penalty for unauthorized access to a computer is two years
in prison and a fine. There are higher penalties – up to 10 years in
prison – when the hacker also modifies data". Unauthorized access
even to expose vulnerabilities for the benefit of many is not legal, says
Robertson. "There's no defense in our hacking laws that your behavior
is for the greater good. Even if it's what you believe."
Legal hackers hacking with good intention
not have intention harm any ones privacy
"black hat" hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
Black hat hackers form the stereotypical, illegal hacking groups often
portrayed in popular culture, and are "the epitome of all that the public
fears in a computer criminal". Black hat hackers break into secure networks
to destroy, modify, or steal data; or to make the network unusable for those
who are authorized to use the network. Black hat hackers are also referred
to as the "crackers" within the security industry and by modern
programmers. Crackers keep the awareness of the vulnerabilities to
themselves and do not notify the general public or the manufacturer for
patches to be applied. Individual freedom and accessibility is promoted over
privacy and security. Once they have gained control over a system, they
may apply patches or fixes to the system only to keep their reigning control.
Richard Stallman invented the definition to express the maliciousness of a
criminal hacker versus a white hat hacker who performs hacking duties to
identify places to repair.
2. Black hat hackers -
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Grey hat hacker lies between a black hat and a white
hat hacker. A grey hat hacker may surf the Internet and
hack into a computer system for the sole purpose of
notifying the administrator that their system has a
security defect, for example. They may then offer to
correct the defect for a fee. Grey hat hackers sometimes
find the defect of a system and publish the facts to the
world instead of a group of people. Even though grey
hat hackers may not necessarily perform hacking for
their personal gain, unauthorized access to a system
can be considered illegal and unethical.
3. Grey hat hackers
Just like a golden middle stage between white and
black hat hackers
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
 Elite hacker –
social status among hackers, elite is used to describe the most skilled. Newly discovered
exploits circulate among these hackers. Elite groups such as Masters of Deception
conferred a kind of credibility on their members.
 Script kiddies -
script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into
computer systems by using automated tools written by others (usually by other black hat
hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid,
child—an individual lacking knowledge and experience, immature),usually with little
understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is
someone who is new to hacking or preaching and has almost no knowledge or experience
of the workings of technology and hacking.
 Blue hat –
blue hat hacker is someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft
also uses the term Blue Hat to represent a series of security briefing events. HacktivistA
hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or
political message.Hacktivism can be divided into two main groups:Cyberterrorism —
Activities involving website defacement or denial-of-service attacks; and,Freedom of
information — Making information that is not public, or is public in non-machine-
readable formats, accessible to the public.
Types of hacking
progarmmes
Trojan
horses
A Trojan horse is a
program that seems to
be doing one thing but
is actually doing
another. It can be used
to set up a back door in
a computer system,
enabling the intruder to
gain access later. (The
name refers to the horse
from the Trojan War,
with the conceptually
similar function of
deceiving defenders into
bringing an intruder
into a protected area.)
Computer
virus
A virus is a self-
replicating program
that spreads by
inserting copies of itself
into other executable
code or documents. By
doing this, it behaves
similarly to a biological
virus, which spreads by
inserting itself into
living cells. While some
viruses are harmless or
mere hoaxes, most are
considered malicious.
Computer
worm
Like a virus, a worm is
also a self-replicating
program. It differs
from a virus in that
(a.) it propagates
through computer
networks without
user intervention; and
(b.) does not need to
attach itself to an
existing program.
Nonetheless, many
people use the terms
"virus" and "worm"
interchangeably to
describe any self-
propagating program.
1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy—
are very popular with hackers.
2) Helba from the .hack manga and anime series
for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Books related with hacking -
Films
1) Antitrust
2) Cypher
3) Eagle Eye
4)Enemy of the State
5)Firewall
6)Girl With The Dragon
7)Tattoo
8)Hackers
9)LiveFree or Die Hard
10)The Matrix series
Etc.
Thank you
All references are from >

Mais conteúdo relacionado

Mais procurados (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
hacking
hackinghacking
hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 

Semelhante a Hacking

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack SlideCikgu Syam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptxAlefya1
 

Semelhante a Hacking (20)

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Hackers
HackersHackers
Hackers
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
hacking
hackinghacking
hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Hacking

  • 2. Hacking Advantages Keep us alert about our safety Can be used to recover lost information where the computer password has been lost Disadvantages Criminal can use it & harm privacy
  • 3. Although hacking is most often associated in the popular consciousness with one code breaker breaking into a computer to steal data or wreak havoc, the word is used in a variety of senses. Within tech communities, the word often refers to "hacking together" a quick program to solve a problem creatively. hacking someone account is disrespecting some ones privacy. What is hacking?
  • 4. Hackers do what they do using a variety of methods. They're usually adept at working with computers, which makes them good at finding security vulnerabilities. Another way that hackers get data that is seldom discussed is called "social engineering." Social engineering is a private investigator-like way of getting data; you pose as someone you're not on the phone or in an email to get the information you need. How is hacking done?
  • 5. Not all hackers are bad. Many work for good in a variety of ways. "White hat" hackers are hackers that work to either expose vulnerabilities in computer systems so they can be repaired or exploit vulnerabilities in organizations they dislike as a form of activism. Although hacking really is isn't as glamorous as it is in the movies, the reality is a lot more interesting. There's clearly more to it than lone code breakers breaking into government computer systems overnight. Are all hackers bad?
  • 6.
  • 7. 1. White hat hackers - source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29 Struan Robertson, legal director at Pinsent Masons LLP, and editor of OUT-LAW.com, says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offence under the Computer Misuse Act. The unauthorized access offence covers everything from guessing the password, to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe." Legal hackers hacking with good intention not have intention harm any ones privacy
  • 8. "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair. 2. Black hat hackers - Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 9. Grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical. 3. Grey hat hackers Just like a golden middle stage between white and black hat hackers Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 10.  Elite hacker – social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.  Script kiddies - script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is someone who is new to hacking or preaching and has almost no knowledge or experience of the workings of technology and hacking.  Blue hat – blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term Blue Hat to represent a series of security briefing events. HacktivistA hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.Hacktivism can be divided into two main groups:Cyberterrorism — Activities involving website defacement or denial-of-service attacks; and,Freedom of information — Making information that is not public, or is public in non-machine- readable formats, accessible to the public.
  • 12. Trojan horses A Trojan horse is a program that seems to be doing one thing but is actually doing another. It can be used to set up a back door in a computer system, enabling the intruder to gain access later. (The name refers to the horse from the Trojan War, with the conceptually similar function of deceiving defenders into bringing an intruder into a protected area.) Computer virus A virus is a self- replicating program that spreads by inserting copies of itself into other executable code or documents. By doing this, it behaves similarly to a biological virus, which spreads by inserting itself into living cells. While some viruses are harmless or mere hoaxes, most are considered malicious. Computer worm Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self- propagating program.
  • 13. 1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy— are very popular with hackers. 2) Helba from the .hack manga and anime series for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 Books related with hacking -
  • 14. Films 1) Antitrust 2) Cypher 3) Eagle Eye 4)Enemy of the State 5)Firewall 6)Girl With The Dragon 7)Tattoo 8)Hackers 9)LiveFree or Die Hard 10)The Matrix series Etc.