SlideShare une entreprise Scribd logo
1  sur  3
Hacker word that describes person who have special skills in the field of computer and
information security. Hacking means that a set of clever programmers who challenge the
different systems and try to storm it , and not necessarily to commit a crime , but their
success in penetration is considered a success for their abilities and skills. However,the law
considered outsiders who enter the default place should not be in it. And to do this optional
process in which the programmer tested his abilities without knowing his real name or
declare himself. But some of them are exploited by criminal who clear information and others
are commercially exploited for the purposes of spying and to steal some money.
 Many companies like Microsoft need to protect their systems so they found the best
method to protect their system is to hire hackers with high salaries their mission is
attempt to penetrate their different systems and find the points of weakness..
The classificationofhackers morally
we have 3 concepts :
1: White hat hacker :a computerhackers intendingtoimprove computer security
2: Black hat hacker: a computerhackers intendingtostorm the computer or Internet securityfor
illegal personal gain
3: Greyhat hacker: a computer hackers liesbetweena black hat and a white hat hacker
Hacker have many attack techniquesbutthe most common technique:isby using Trojan horses and
this
technique mostlyusedwhen hackers needto storm a personal computer
(i will give to you) example showsyou how Trojan technique works :
if you will downloada program but this program have virus
this virus will opena hiddensecrethole through your computer firewall whenthe virus reached to
your
computer it will delete anyinformationor it will harm the host computer systemstheiris a ratio
50% ifyou will scan your computer by using antivirusand you have many virusesinyour computer
you
will findTrojan horse virus at your computer
Five months ago, hackers sneakedto the computer networkof Sony Pictures Entertainment ,The
attackers stole a large number ofsecret documents,which iscurrently beingloaded(in the first place
by
journalists) from file-sharingnetworks.Itis believedwidely hackerstobe supportedby the
government
of North Korea, which isangry at Sony to produce the interview,a filmwhich describe the
assassination
of North Korean leaderKim Jong-un.the threat of terrorismagainst the movie theaters offercaused
Sony to cancel the plannedrelease ofher ChristmasDay holiday. ( this picture showsyou that maybe
north Korea paid to hackers to storm Sony security system)
‫الموضوع‬ ‫فى‬ ‫ايد‬ ‫ليها‬ ‫الشمالية‬ ‫كوريا‬ ‫ان‬ ‫بيثبت‬ ‫الى‬ ‫الكالم‬ ‫صورة‬ ‫احط‬
on Monday, November24th Sony discoveredthat theirown company's network has beenhacked.
The
attackers took terabytesof data, delete the original copiesof Sony computers,leavingthe threat to
release the informationmessagesif Sony didnot respond to the demandsof the strikers.this image,
shows the message that appearedon the computer screensat Sony companies.( and this is the
message )
‫نفسه‬ ‫ذات‬ ‫الهاك‬ ‫صورة‬ ‫احط‬
(now i want talk about certaingroup ofpeople calledlizard squad )
lizard squad is a black hat hacking group
They attacked facebook before but facebookdenieditwas hackedand said that the access issues
earlier were "notthe resultof a third party attack".
so Lizard Squad stated that it was responsible forthe site,and Instagram going down.(
‫توقف‬ ‫صورة‬ ‫احط‬ ‫كده‬ ‫وبعد‬‫العمل‬ ‫عن‬ ‫بوك‬ ‫الفيس‬
Lizard Squad also claimedto be behinda serieshacks of Microsoftand Sony gaming networks over
Christmas as well.
lizard squad made their own channel in Sony and Microsoft servers
‫السيرفر‬ ‫صورة‬ ‫احط‬ ‫كده‬ ‫وبعد‬
A hacker claiming to be from Lizard Squad - a 22-year-old callinghimselfMemberTwo - said the group
had hacked the sites"because we can".
He also suggestedthe motive was to demonstrate weaknessesinthe Microsoftand Sony systems.
"It'sjust such a huge company Microsoft...Do you not think theyshould be able to preventsuch an
attack?" he told BBC Radio Five Live.
"Is Christmasreally about childrenplayingwith theirnew consoles,or playingwith their newtoys, or
is it
about them spendingtime with theirfamiliesand celebratingChristmas?" he added."I think
everyone's
just taking it all out of the ordinary and Microsoftwill receive a wonderful Christmas presentfrom us
The name Lizard Squad is generallyusedas a signature on a site that the group has taken
responsibilityforhacking
and they lefttheirsignature after hacking the websitesor software
‫التوقيع‬ ‫بتاعت‬ ‫الصورة‬ ‫احط‬ ‫وبعدين‬

Contenu connexe

Tendances

Best Practices to Protect Personal Information
 Best Practices to Protect Personal Information Best Practices to Protect Personal Information
Best Practices to Protect Personal Information
hosamshahin
 

Tendances (20)

HACKING by HARSHAN
HACKING  by HARSHANHACKING  by HARSHAN
HACKING by HARSHAN
 
Android malware
Android malwareAndroid malware
Android malware
 
Android malware
Android malwareAndroid malware
Android malware
 
Hacking
HackingHacking
Hacking
 
C 7
C 7C 7
C 7
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
Best Practices to Protect Personal Information
 Best Practices to Protect Personal Information Best Practices to Protect Personal Information
Best Practices to Protect Personal Information
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Hacking
Hacking Hacking
Hacking
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Wanna-cry Ransome ware
Wanna-cry Ransome wareWanna-cry Ransome ware
Wanna-cry Ransome ware
 

Similaire à Hacker word that describes person who have special skills in the field of computer and information security

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
haney888
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
Gavin Davey
 

Similaire à Hacker word that describes person who have special skills in the field of computer and information security (20)

Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
File000145
File000145File000145
File000145
 
Unit 1
Unit 1Unit 1
Unit 1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Malware
MalwareMalware
Malware
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Crimeware Fingerprinting Final
Crimeware Fingerprinting  FinalCrimeware Fingerprinting  Final
Crimeware Fingerprinting Final
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Hacker word that describes person who have special skills in the field of computer and information security

  • 1. Hacker word that describes person who have special skills in the field of computer and information security. Hacking means that a set of clever programmers who challenge the different systems and try to storm it , and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills. However,the law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.  Many companies like Microsoft need to protect their systems so they found the best method to protect their system is to hire hackers with high salaries their mission is attempt to penetrate their different systems and find the points of weakness.. The classificationofhackers morally we have 3 concepts : 1: White hat hacker :a computerhackers intendingtoimprove computer security 2: Black hat hacker: a computerhackers intendingtostorm the computer or Internet securityfor illegal personal gain 3: Greyhat hacker: a computer hackers liesbetweena black hat and a white hat hacker Hacker have many attack techniquesbutthe most common technique:isby using Trojan horses and this technique mostlyusedwhen hackers needto storm a personal computer (i will give to you) example showsyou how Trojan technique works : if you will downloada program but this program have virus this virus will opena hiddensecrethole through your computer firewall whenthe virus reached to your computer it will delete anyinformationor it will harm the host computer systemstheiris a ratio 50% ifyou will scan your computer by using antivirusand you have many virusesinyour computer you will findTrojan horse virus at your computer
  • 2. Five months ago, hackers sneakedto the computer networkof Sony Pictures Entertainment ,The attackers stole a large number ofsecret documents,which iscurrently beingloaded(in the first place by journalists) from file-sharingnetworks.Itis believedwidely hackerstobe supportedby the government of North Korea, which isangry at Sony to produce the interview,a filmwhich describe the assassination of North Korean leaderKim Jong-un.the threat of terrorismagainst the movie theaters offercaused Sony to cancel the plannedrelease ofher ChristmasDay holiday. ( this picture showsyou that maybe north Korea paid to hackers to storm Sony security system) ‫الموضوع‬ ‫فى‬ ‫ايد‬ ‫ليها‬ ‫الشمالية‬ ‫كوريا‬ ‫ان‬ ‫بيثبت‬ ‫الى‬ ‫الكالم‬ ‫صورة‬ ‫احط‬ on Monday, November24th Sony discoveredthat theirown company's network has beenhacked. The attackers took terabytesof data, delete the original copiesof Sony computers,leavingthe threat to release the informationmessagesif Sony didnot respond to the demandsof the strikers.this image, shows the message that appearedon the computer screensat Sony companies.( and this is the message ) ‫نفسه‬ ‫ذات‬ ‫الهاك‬ ‫صورة‬ ‫احط‬ (now i want talk about certaingroup ofpeople calledlizard squad ) lizard squad is a black hat hacking group They attacked facebook before but facebookdenieditwas hackedand said that the access issues earlier were "notthe resultof a third party attack". so Lizard Squad stated that it was responsible forthe site,and Instagram going down.( ‫توقف‬ ‫صورة‬ ‫احط‬ ‫كده‬ ‫وبعد‬‫العمل‬ ‫عن‬ ‫بوك‬ ‫الفيس‬ Lizard Squad also claimedto be behinda serieshacks of Microsoftand Sony gaming networks over Christmas as well. lizard squad made their own channel in Sony and Microsoft servers ‫السيرفر‬ ‫صورة‬ ‫احط‬ ‫كده‬ ‫وبعد‬ A hacker claiming to be from Lizard Squad - a 22-year-old callinghimselfMemberTwo - said the group
  • 3. had hacked the sites"because we can". He also suggestedthe motive was to demonstrate weaknessesinthe Microsoftand Sony systems. "It'sjust such a huge company Microsoft...Do you not think theyshould be able to preventsuch an attack?" he told BBC Radio Five Live. "Is Christmasreally about childrenplayingwith theirnew consoles,or playingwith their newtoys, or is it about them spendingtime with theirfamiliesand celebratingChristmas?" he added."I think everyone's just taking it all out of the ordinary and Microsoftwill receive a wonderful Christmas presentfrom us The name Lizard Squad is generallyusedas a signature on a site that the group has taken responsibilityforhacking and they lefttheirsignature after hacking the websitesor software ‫التوقيع‬ ‫بتاعت‬ ‫الصورة‬ ‫احط‬ ‫وبعدين‬