SlideShare une entreprise Scribd logo
1  sur  12
1. What is hacking?
2. Types of Hackers
3. Difference between Hackers and
Crackers
4. Criminological theories
5. Academic Studies
• Definition: A hacker or hackers are commonly known as
someone who seeks to exploit weaknesses within
a computer system or network. Hackers can be
associated as a community that works together to
attack a computer or network.
Short Definition: To gain access to (a computer file or network)
illegally or without authorization. (The Free
Dictionary, 2013)
Look at the word cloud below and see if you can identify any meanings
towards the words.

Towards the end of topic 1 the words cloud will help you to associate meanings and
theories to these words.
• The definition of a hacker has been in a long
strand of controversy about what a true hacker
definitions really is and why an individual or
community decide to attack specific
organisations.

“Despite, decades of computer security
research, billions spent on secure operations, and
growing training requirements, we seem incapable
of operating computer securely.” („The
Cybersecurity Risk‟, 2012).
A hacker has to understand computers to an advanced
level. However, it is important to note that there are two
types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a
weaknesses within their computer network.
Or

• A unethical hacker hacks into a system to steal or view
information on purpose.
To understand more about
Hackers and the various types
Please watch the go animate
Videos called
“Groups of Hackers”.
Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1
http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu
m=linkshare&utm_campaign=usercontent

Hackers Hat (White) – GoAnimate Scene 2
http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc
ontent

Hackers Hat (Grey) – GoAnimate Scene 3
http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi
um=linkshare&utm_campaign=usercontent
The title hacker is given to anyone breaking into a
computer. However, professional in the industry argue that
there should be two terms hackers and crackers.
Computer criminals are often seen as committing a
cybercrime through breaking into someone's computer or
computer network known as committing a criminal offence
commonly known as – „Black Hat‟. These types of people
should be called CRACKERS!

Instead of someone known as a computer security expert –
„White Hat‟. These types of people should be called
HACKERS!
Below is some criminological theories presented in hackers research. Please take
note of some of these theories and in your own time research them in more depth.

Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become
Computer Hackers'
Below is some academic studies presented on hackers research. Please take note
of some of these studies and in your own time research them in more depth.

Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
When each section of the material has been read please take
time out and go back onto the Moodle course and locate the
link called „Topic 1 – Hackers Journal‟ .
Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778

Please write down what you have learnt from this PowerPoint
and continue to reflect back on your journal every time a
material has been read in Moodle. This will ultimately help
you to complete your assessment at the end of the course.
Thank You
Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.
Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier.
GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013).
Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press.
Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political
science. London: Yale university Press.
Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier
No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source
Elite, EBSCOhost. Available at:
http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013).
Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological
Review 22 (6), pp. 664–670, JSTOR. Available at:
http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November
2013).
The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27
November 2013).
Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer
Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at:
http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87
497819 (Accessed: 27 November 2013).

Contenu connexe

Tendances

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking pptfuckubitches
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationZahid Rajeel
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 

Tendances (20)

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
185
185185
185
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 

En vedette

Theft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglaryTheft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglaryeleanorrrxo
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2joanalynn norte
 
Lesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers ToolLesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers Toolangelyn perez
 
Cooperative Learning with the Computer
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the ComputerJomar Urbano
 
Lesson 9 educational technology 10
Lesson 9  educational  technology  10Lesson 9  educational  technology  10
Lesson 9 educational technology 10ray mijares
 
eductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Eboraeductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose EboraCarren Pangilinan
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAkikayfernandez
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
The computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx aThe computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx achikay04
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copymiss yhda
 

En vedette (20)

Theft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglaryTheft act 1968- theft, robbery and burglary
Theft act 1968- theft, robbery and burglary
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers ToolLesson 11 The Computer as The Teachers Tool
Lesson 11 The Computer as The Teachers Tool
 
Cooperative Learning with the Computer
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the Computer
 
Lesson 9 educational technology 10
Lesson 9  educational  technology  10Lesson 9  educational  technology  10
Lesson 9 educational technology 10
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
eductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Eboraeductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Ebora
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx aThe computer as the teacher’s tool.pptx a
The computer as the teacher’s tool.pptx a
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
 

Similaire à Hacking Presentation

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ictAbdul Wahab Raza
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladeshTaibul Islam Tushar
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Hacking and Civic Hacking
Hacking and Civic HackingHacking and Civic Hacking
Hacking and Civic HackingDiego Donaggio
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSteven Hatfield
 
Efficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation ProcessesEfficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation ProcessesMikko Ahonen
 
Deep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdfDeep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdfallison922660
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationMike Linksvayer
 
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG: connecting the knowledge community
 

Similaire à Hacking Presentation (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
ethics final project
ethics final projectethics final project
ethics final project
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ict
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
hackers
hackershackers
hackers
 
Hacking and Civic Hacking
Hacking and Civic HackingHacking and Civic Hacking
Hacking and Civic Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Efficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation ProcessesEfficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation Processes
 
Deep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdfDeep-Dive-AI-final-report.pdf
Deep-Dive-AI-final-report.pdf
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
 
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
 

Dernier

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Hacking Presentation

  • 1.
  • 2. 1. What is hacking? 2. Types of Hackers 3. Difference between Hackers and Crackers 4. Criminological theories 5. Academic Studies
  • 3. • Definition: A hacker or hackers are commonly known as someone who seeks to exploit weaknesses within a computer system or network. Hackers can be associated as a community that works together to attack a computer or network. Short Definition: To gain access to (a computer file or network) illegally or without authorization. (The Free Dictionary, 2013)
  • 4. Look at the word cloud below and see if you can identify any meanings towards the words. Towards the end of topic 1 the words cloud will help you to associate meanings and theories to these words.
  • 5. • The definition of a hacker has been in a long strand of controversy about what a true hacker definitions really is and why an individual or community decide to attack specific organisations. “Despite, decades of computer security research, billions spent on secure operations, and growing training requirements, we seem incapable of operating computer securely.” („The Cybersecurity Risk‟, 2012).
  • 6. A hacker has to understand computers to an advanced level. However, it is important to note that there are two types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a weaknesses within their computer network. Or • A unethical hacker hacks into a system to steal or view information on purpose. To understand more about Hackers and the various types Please watch the go animate Videos called “Groups of Hackers”.
  • 7. Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1 http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu m=linkshare&utm_campaign=usercontent Hackers Hat (White) – GoAnimate Scene 2 http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc ontent Hackers Hat (Grey) – GoAnimate Scene 3 http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi um=linkshare&utm_campaign=usercontent
  • 8. The title hacker is given to anyone breaking into a computer. However, professional in the industry argue that there should be two terms hackers and crackers. Computer criminals are often seen as committing a cybercrime through breaking into someone's computer or computer network known as committing a criminal offence commonly known as – „Black Hat‟. These types of people should be called CRACKERS! Instead of someone known as a computer security expert – „White Hat‟. These types of people should be called HACKERS!
  • 9. Below is some criminological theories presented in hackers research. Please take note of some of these theories and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become Computer Hackers'
  • 10. Below is some academic studies presented on hackers research. Please take note of some of these studies and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
  • 11. When each section of the material has been read please take time out and go back onto the Moodle course and locate the link called „Topic 1 – Hackers Journal‟ . Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778 Please write down what you have learnt from this PowerPoint and continue to reflect back on your journal every time a material has been read in Moodle. This will ultimately help you to complete your assessment at the end of the course. Thank You
  • 12. Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press. Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier. GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013). Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press. Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political science. London: Yale university Press. Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013). Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological Review 22 (6), pp. 664–670, JSTOR. Available at: http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November 2013). The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27 November 2013). Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87 497819 (Accessed: 27 November 2013).