the impact of ict “ hacking”
DESCRIPTION
The Impact Of ICT “ Hacking”. Prepared By : Name : Mohammad Sahrizan Bin Saldikun C lass:4 c Teacher Name: Ismail Bin Hj Jaani. Content. Definition. - PowerPoint PPT PresentationTRANSCRIPT
1
The Impact Of ICT“Hacking”
Prepared By :Name : Mohammad Sahrizan Bin Saldikun
Class:4 cTeacher Name: Ismail Bin Hj Jaani
2
Content• DefinitionIntroducti
on• Black Hat Hacker • White Hat Hacker• Grey Hat Hacker• Elite Hat Hacker
Content
• Overcome Hacking Through…Solution
• BibliographySource
3
Definition• During the 1990’s,the term hacking
originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.
4
Type Of Hacker / At any Rates, Here Are The Type Of Hacker.
a. White Hatb. Black Hatc. Grey Hat
5
White Hat HackerSomeone who has non malicious intent
whenever he break into security system , In fact , a large number of White Hacker are security expert
themselves who wants to push the boundries.
6
Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.
7
Grey Hat HackerThe type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.
8
Conclusion
Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.
9
Overcome Hacking Through …
Thing to do is keep
your password a secret
You need to make
sure your computer doesn’t
have viruses , trojans ,
keyloggers , etc.
Keep your scripts
and download program updates
Doesn’t have a
writable file
permissions
Never leave
scripts on your
account that are
not being used.
10
Bibliography• http://www.google.com• http://www.wikipedia.com• http://www.secpoint.com/types-of-hacker.html