What is Hacking? AND Types of Hackers

Page 1

CYBER SECURITY TRAINING INSTITUTE

INFOSAVVY wwww.info-savvy.com


INFOSAVVY

About us

INFO-SAVVY Infosavvy is a training institute providing trainings and certifications in multiple domains viz IT Management, Information Security Management, Cyber Security & Quality management to aspiring technology professionals.

www.info-savvy.com


INFOSAVVY

What is Hacking? AND Types of Hackers www.info-savvy.com


INFOSAVVY

What is Hacking?

Hacking in the field of computer security refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources. It involves modifying system or application features to achieve a goal outside its creator's original purpose. www.info-savvy.com


INFOSAVVY

TYPES OF HACKERS

WHITE HAT HACKERS.

BLACK HAT HACKERS

GARY HAT HACKERS

www.info-savvy.com


INFOSAVVY

White hat hackers

Additionally called ethical hackers, try to work within the public's best interest, instead of to make turmoil. Many white hat hackers work doing penetration testing, hired to try to interrupt into the company's networks to search out and report on security vulnerabilities. The protection companies then help their customers mitigate security problems before criminal hackers will exploit them. www.info-savvy.com


INFOSAVVY

Black hat hackers

Intentionally gain unauthorized access to networks and systems with malicious intent, whether or not to steal information, unfold malware or benefit from ransom ware, vandalism or otherwise injury systems or for the other reason -- as well as gaining infamy. Black hat hackers are criminals by definition because they violate laws against accessing systems while not authorization, however they'll additionally interact in different criminal activity, together with fraud and distributed denial-of-service attacks

www.info-savvy.com


INFOSAVVY

Gary hat hackers Fall somewhere between white hat hackers and black hat hackers. Whereas their motives is also almost like those of white hat hackers, grey hats are a lot of possible than white hat hackers to access systems while not authorization; at identical time, they're a lot of possible than black hat hackers to avoid doing unneeded injury to the systems they hack. Though they are not generally -- or solely -- actuated by cash, Grey hat hackers could provide to fix vulnerabilities they need discovered through their own, unauthorized, activities instead of exploitation their information to use vulnerabilities for illegal profit. www.info-savvy.com


INFOSAVVY

Who is a Hacker? Types of Hackers

A hacker is a person, who breaks into a system or network without any authorization to destroy, steal sensitive data, or performs malicious attacks. Hacker is an intelligent individual with excellent computer skills, along with the ability to create and explore into the computer's software and hardware. Usually a hacker would be a skilled engineer or programmer with enough knowledge to discover vulnerabilities in a target system. She/he is generally a subject expert and enjoys learning the details of various programming languages and computer systems. www.info-savvy.com


INFOSAVVY

The subsequent list classifies hackers consistent with their intent. Ethical Hacker (White hat):Â A hacker WHO gains access to systems with a read to fix the identified weaknesses. They will additionally perform penetration Testing and vulnerability assessments. Cracker (Black hat):Â A hacker who gains unauthorized access to pc systems for private gain. The intent is sometimes to steal company information, violate privacy rights, transfer funds from bank accounts etc. www.info-savvy.com


INFOSAVVY Grey hat: A hacker who is in between moral and black hat hackers. He/she breaks into pc systems while not authority with a read to spot weaknesses and reveals them to the system owner. Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This can be sometimes done by hijacking web sites and exploit the message on the hijacked website. Phreaker: A hacker who identifies and exploits weaknesses in telephones rather than computers. Script kiddies: A non-skilled one that gains access to pc systems using already created tools. www.info-savvy.com


INFOSAVVY

THANK YOU Get in Touch +91 9987378932 WWW.INFO-SAVVY.COM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.