Full screen
Share
4.1b
ziqian wnag
Created on October 28, 2023
Over 30 million people create interactive content in Genially.
Check out what others have designed:
LET’S GO TO LONDON!
Personalized
SLYCE DECK
Personalized
ENERGY KEY ACHIEVEMENTS
Personalized
CULTURAL HERITAGE AND ART KEY ACHIEVEMENTS
Personalized
ABOUT THE EEA GRANTS AND NORWAY
Personalized
DOWNFALLL OF ARAB RULE IN AL-ANDALUS
Personalized
HUMAN AND SOCIAL DEVELOPMENT KEY
Personalized
Transcript
1.history of hackingIn the early days, hackers mainly used software to exploit loopholes in the system to achieve the purpose of hacking, and then hackers using hardware appeared. After that, hackers were divided into two categories, one was to protect the security of computer systems, and the other was to try to destroy them. After entering the Internet era, network hackers appeared, they used the network to invade others. 2.White Hat Hackers White hat hackers are experts who work in a legal and ethical manner to help organizations protect their information assets against potential malicious attacks by testing, evaluating, and enhancing the security of computer systems and networks. 3.gray hat hackers Grey Hat hackers are less clear-cut, acting somewhere between moral and immoral, and they are not an officially recognized or widely accepted category within the cybersecurity community, For example, they steal information but do not carry out illegal activities such as selling it 4.Black Hat Hackers Black hat hackers are mainly engaged in illegal activities, such as stealing and selling data, disclosing other people's privacy, extortion, etc., and they should be punished by law 5.Ethical vs. Unethical hacking Ethical hackers mainly focus on discovering the vulnerabilities of the system and preventing them in advance, while unethical hackers mainly attack the system for their own interests and harm others 6.How all three forms of hacking-related to Cyber Security White hat hackers provide prevention for some potential attacks and are good assistants for cyber security. The position of gray hat hackers is not clear, but the attacks they launch also reveal the insecurity of the system and expose the danger of the system. To a certain extent, they also contribute to cyber security. Is the biggest enemy of network security 7.resources: https://www.taylorfrancis.com/chapters/edit/10.4324/9781315199627-10/sociology-hackers-tim-jordan-paul-taylor https://www.usenix.org/legacy/publications/login/2010-10/openpdfs/bookreviews1010.pdf https://www.taylorfrancis.com/books/mono/10.4324/9780203201503/hackers-paul-taylor