The document discusses the history and types of hacking including black hat, white hat and grey hat hackers. It describes how hacking works through social engineering, passwords and malware. Key drivers for hacking are listed as financial gain, espionage, notoriety and politically motivated reasons. Methods of prevention and ethical hacking are also outlined.
The document discusses the history and types of hacking including black hat, white hat and grey hat hackers. It describes how hacking works through social engineering, passwords and malware. Key drivers for hacking are listed as financial gain, espionage, notoriety and politically motivated reasons. Methods of prevention and ethical hacking are also outlined.
Original Description:
Powerpoint presentation about the basic methods of hacking
The document discusses the history and types of hacking including black hat, white hat and grey hat hackers. It describes how hacking works through social engineering, passwords and malware. Key drivers for hacking are listed as financial gain, espionage, notoriety and politically motivated reasons. Methods of prevention and ethical hacking are also outlined.
The document discusses the history and types of hacking including black hat, white hat and grey hat hackers. It describes how hacking works through social engineering, passwords and malware. Key drivers for hacking are listed as financial gain, espionage, notoriety and politically motivated reasons. Methods of prevention and ethical hacking are also outlined.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 10
HACKING
Kamila Líšková & Kristína Klinková
HISTORY OF HACKING • First appeared in 1970s • “The Hacker Papers“ • Movies Tron & War Games • Potential national security risk HOW HACKING WORKS SOCIAL ENGENEERING HACKING PASSWORDS • a manipulation technique designed to exploit human error to gain • trial and error method is known
access to personal information as a brute force attack, involves
• using a fake identity hackers trying to guess every • phishing scams possible combination to gain • spam emails access • instant messages • dictionary attack, which is a • fake websites program that inserts common words into password fields to see if one works. INFECTING DEVICES WITH MALWARE
• malware, or malicious software, is any program or file that is
intentionally harmful to a computer, network or server • hackers may infiltrate a user’s device to install malware • target potential victims via email, instant messages and websites with downloadable content or peer-to-peer networks KEY DRIVERS WHICH LEAD TO HACKING
1) financial gain through the theft of credit card details
2) corporate espionage 3) to gain notoriety or respect for their hacking talents 4) state-sponsored hacking that aims to steal business information and national intelligence 5) politically motivated hackers – hacktivists - who aim to raise public attention by leaking sensitive information, such as Anonymous, LulzSec, and WikiLeaks TYPES OF HACKING 01 Black Hat Hackers – “The bad guys“ • inflict serious damage on both computer users and the organizations they work for, hey can steal sensitive personal information, compromise computer and financial systems, and alter or take down the functionality of websites and critical networks
02 White Hat Hackers – “The good guys“
• helps expose vulnerabilities in systems before black hat hackers can detect and exploit them • ethical hacking 06 03 Grey Hat Hackers • between the good and the bad guys • common good What can be hacked? WebCams Smart devices
5) USE A VPN - a virtual private network 6) Avoid clicking on ads or strange links ETHICAL HACKING • refers to the actions carried out by white hat security hackers • involves gaining access to computer systems and networks to test for potential vulnerabilities, and then fixing any identified weaknesses • legal • https://www.fortinet.com/resources/cyberglossary/what-is-hacking • https://www.kaspersky.com/resource-center/definitions/what-is-hacking • https://www.techtarget.com/searchsecurity/definition/malware THANK YOU FOR YOUR ATTENTION