SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
HACKER
HACKER
Group Members
Index
• Abstract (1)
• Introduction (2)
• Problem Statement (3)
• Objective (4)
• Literature Review (5)
• Hacking (6)
• Hacker (7)
• Types of Hackers (8)
• Black Hat Hacker (9)
• White Hat Hacker (10)
• Black Hat Hacker vs White Hat
Hacker (11)
• Conclusion (12)
• References (13)
• Thank you (14)
• Any Question (15)
• Video Link (16)
Abstract
➢Cyberspace hacker or black hat hacker has led to new cyber
crimes such as exploitation of computer system vulnerabilities. In
an effort to mitigate this phenomenon, companies have hired
security professionals with similar skills as malicious hackers to
keep their information safe. So this presentation is an attempt to
discuss Black Hat andWhite Hat Hackers.
1
Introduction
➢Today the modern society reliance on the network technology which give
benefits of collaboration to organizations and individuals.
➢This change also lead us to the new cybercrime (Hacking).
➢To mitigate these issues or to make system secure company professional
hire ethical hacker also known as white hat hacker.
➢So in this presentation we will discuss about the role and positions of
white hat hacker and black hat hacker.
2
Problem Statement
➢Hacking is an exploitation of vulnerability and follows a series of
well-defined actions that make it a process (EC-Council, 2018).
➢White Hat and Black Hat hackers share an almost common hacking
process and skills. One hacker exploit system vulnerabilities to
damage the system or the another one is to resolve the problem.
➢So, it is essential to understand those ethical values are in relation to
back hats and white hat hackers.
3
Objectives
➢To know about hackers and ethical values
➢Role of hackers
➢Black hat and white hat hacker roles and positions
4
Literature Review
➢Company information has been compromised due to security
threats and hacking. With the recent rise of security breaches, many
companies have tried to mislead the hacking incident by hiring
security professionals with similar skills to hackers to ensure that
their infrastructure is safe and that they are ready for threats.
5
Hacking
➢The term hacking means Stole someone information.
➢Hacking or access someone information without there permission is
illegal and it is a crime.
➢To gain access on someone pc or there data by exploiting the
vulnerabilities is known as hacking (sharma, 2008).
6
Hacker
➢The term "hacker" was first used to refer to the best and radical
programmers in the field of computer science (Sharma, 2008).
➢Hack refers to "innovation, style and technical features“
(madarie,n.d).
➢Highly skilled person who can gain authorized or unautherized
access on some other computers or private data (Techterm, 2013).
7
Type of Hacker
8
BLACK HAT HACKER
WHITE HAT HACKER
GREY HAT HACKER
Black Hat Hacker
➢Also known as Cracker.
➢Involve in bad or illegal activities.
➢Do malicious work.
➢Exploit System vulnerabilities to harm other.
➢Trying to harm system and stole useful information.
9
White Hat Hacker
10
➢Also known as Ethical hacker.
➢Penetrate testing and help the organization to secure there system.
➢Follow legal and permission based procedure.
➢Exploit System vulnerabilities to help the organization.
➢Trying to secure system from security threats.
Black Hat Hacker vs White Hat Hacker
Black Hat White Hat
Known as Cracker. Known as Ethical hacker.
Do Illegal and malicious work. Do Legal work.
Damage system and stole data.
protect and help organization to
secure there data.
Exploit System to do malicious
work and own sole purpose.
Exploit System to help other and
protect from threats.
11
Conclusion
➢Hacking has both illegal and legal aspects. Unauthorized access and
use or personal information or computer resources are part of illegal
hacking. Where as legal or ethical aspect has legal limitations and
there is no charge to press. This is being morally and legally justified.
These are the common factor between Black Hat Hacker and White
Hat Hacker.
12
Citation and References
➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited.
➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological
Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446
➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of
MotivationalTypes of Values in a Sample of Hackers Under a Creative
Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC
BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International
Journal of Cyber Criminology, 11(1), 973–5089.
https://doi.org/10.5281/zenodo.495773
➢Link of Research paper =
https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat
_-_The_thin_line_of_ethicsedited
13
Thank you
14
Any Question?
15
Video Link
➢Google Drive
https://drive.google.com/file/d/1ITTWaw3qtn0R0h1hFah
J5dHegkOm-aZn/view?usp=sharing
16

Contenu connexe

Tendances (20)

Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
HACKING
HACKINGHACKING
HACKING
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
Social engineering
Social engineering Social engineering
Social engineering
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Web Security
Web SecurityWeb Security
Web Security
 

Similaire à White hat and black hat hackers

Similaire à White hat and black hat hackers (20)

Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
ethics final project
ethics final projectethics final project
ethics final project
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
ACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptxACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
hacking
hackinghacking
hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hackers
HackersHackers
Hackers
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

White hat and black hat hackers

  • 3. Index • Abstract (1) • Introduction (2) • Problem Statement (3) • Objective (4) • Literature Review (5) • Hacking (6) • Hacker (7) • Types of Hackers (8) • Black Hat Hacker (9) • White Hat Hacker (10) • Black Hat Hacker vs White Hat Hacker (11) • Conclusion (12) • References (13) • Thank you (14) • Any Question (15) • Video Link (16)
  • 4. Abstract ➢Cyberspace hacker or black hat hacker has led to new cyber crimes such as exploitation of computer system vulnerabilities. In an effort to mitigate this phenomenon, companies have hired security professionals with similar skills as malicious hackers to keep their information safe. So this presentation is an attempt to discuss Black Hat andWhite Hat Hackers. 1
  • 5. Introduction ➢Today the modern society reliance on the network technology which give benefits of collaboration to organizations and individuals. ➢This change also lead us to the new cybercrime (Hacking). ➢To mitigate these issues or to make system secure company professional hire ethical hacker also known as white hat hacker. ➢So in this presentation we will discuss about the role and positions of white hat hacker and black hat hacker. 2
  • 6. Problem Statement ➢Hacking is an exploitation of vulnerability and follows a series of well-defined actions that make it a process (EC-Council, 2018). ➢White Hat and Black Hat hackers share an almost common hacking process and skills. One hacker exploit system vulnerabilities to damage the system or the another one is to resolve the problem. ➢So, it is essential to understand those ethical values are in relation to back hats and white hat hackers. 3
  • 7. Objectives ➢To know about hackers and ethical values ➢Role of hackers ➢Black hat and white hat hacker roles and positions 4
  • 8. Literature Review ➢Company information has been compromised due to security threats and hacking. With the recent rise of security breaches, many companies have tried to mislead the hacking incident by hiring security professionals with similar skills to hackers to ensure that their infrastructure is safe and that they are ready for threats. 5
  • 9. Hacking ➢The term hacking means Stole someone information. ➢Hacking or access someone information without there permission is illegal and it is a crime. ➢To gain access on someone pc or there data by exploiting the vulnerabilities is known as hacking (sharma, 2008). 6
  • 10. Hacker ➢The term "hacker" was first used to refer to the best and radical programmers in the field of computer science (Sharma, 2008). ➢Hack refers to "innovation, style and technical features“ (madarie,n.d). ➢Highly skilled person who can gain authorized or unautherized access on some other computers or private data (Techterm, 2013). 7
  • 11. Type of Hacker 8 BLACK HAT HACKER WHITE HAT HACKER GREY HAT HACKER
  • 12. Black Hat Hacker ➢Also known as Cracker. ➢Involve in bad or illegal activities. ➢Do malicious work. ➢Exploit System vulnerabilities to harm other. ➢Trying to harm system and stole useful information. 9
  • 13. White Hat Hacker 10 ➢Also known as Ethical hacker. ➢Penetrate testing and help the organization to secure there system. ➢Follow legal and permission based procedure. ➢Exploit System vulnerabilities to help the organization. ➢Trying to secure system from security threats.
  • 14. Black Hat Hacker vs White Hat Hacker Black Hat White Hat Known as Cracker. Known as Ethical hacker. Do Illegal and malicious work. Do Legal work. Damage system and stole data. protect and help organization to secure there data. Exploit System to do malicious work and own sole purpose. Exploit System to help other and protect from threats. 11
  • 15. Conclusion ➢Hacking has both illegal and legal aspects. Unauthorized access and use or personal information or computer resources are part of illegal hacking. Where as legal or ethical aspect has legal limitations and there is no charge to press. This is being morally and legally justified. These are the common factor between Black Hat Hacker and White Hat Hacker. 12
  • 16. Citation and References ➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited. ➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446 ➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of MotivationalTypes of Values in a Sample of Hackers Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International Journal of Cyber Criminology, 11(1), 973–5089. https://doi.org/10.5281/zenodo.495773 ➢Link of Research paper = https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat _-_The_thin_line_of_ethicsedited 13