The Impact Of ICT “ Hacking”

Preview:

DESCRIPTION

The Impact Of ICT “ Hacking”. Prepared By : Name : Mohammad Sahrizan Bin Saldikun C lass:4 c Teacher Name: Ismail Bin Hj Jaani. Content. Definition. - PowerPoint PPT Presentation

Citation preview

1

The Impact Of ICT“Hacking”

Prepared By :Name : Mohammad Sahrizan Bin Saldikun

Class:4 cTeacher Name: Ismail Bin Hj Jaani

2

Content• DefinitionIntroducti

on• Black Hat Hacker • White Hat Hacker• Grey Hat Hacker• Elite Hat Hacker

Content

• Overcome Hacking Through…Solution

• BibliographySource

3

Definition• During the 1990’s,the term hacking

originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.

4

Type Of Hacker / At any Rates, Here Are The Type Of Hacker.

a. White Hatb. Black Hatc. Grey Hat

5

White Hat HackerSomeone who has non malicious intent

whenever he break into security system , In fact , a large number of White Hacker are security expert

themselves who wants to push the boundries.

6

Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.

7

Grey Hat HackerThe type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.

8

Conclusion

Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.

9

Overcome Hacking Through …

Thing to do is keep

your password a secret

You need to make

sure your computer doesn’t

have viruses , trojans ,

keyloggers , etc.

Keep your scripts

and download program updates

Doesn’t have a

writable file

permissions

Never leave

scripts on your

account that are

not being used.