Top Banner
Hackers and Crackers iJacsn
9

Hackers and Crackers

Feb 15, 2016

Download

Documents

suchi

Hackers and Crackers. iJacsn. What is a Hacker?. A person who uses computers to gain unauthorized access to data, a programmer. Build things- “Security Professionals” Good guys. What do they do?. Tell companies if hacking is possible to their software. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hackers and Crackers

Hackers and CrackersiJacsn

Page 2: Hackers and Crackers

What is a Hacker? A person who uses computers to gain

unauthorized access to data, a programmer.

Build things- “Security Professionals” Good guys

Page 3: Hackers and Crackers

What do they do? Tell companies if hacking is possible to

their software. Hackers are visionaries, who can see

new ways to use computers, creating programs that no-one else could conceive.

Page 4: Hackers and Crackers

What is a cracker? Someone that intentionally breaches

computer security. breaks into someone else's computer

system Extensive computer knowledge Bad guys

Page 5: Hackers and Crackers

What are their motives? Criminal activity: they steal identities,

credit card numbers, social security numbers, etc.

Leave viruses Destroy files

Page 6: Hackers and Crackers

How do both parties perform their actions?

Crackers can hack on the servers that you use on the internet. To prevent this from occurring, people should refrain from using shady websites. (Https://)

Hackers would often create and distribute small sections of code called patches to fix the problem.

This is why apps are constantly being updated.

Page 7: Hackers and Crackers

Famous Hackers Bill gates, Steve Wozniack, Steve Jobs

Page 8: Hackers and Crackers

References https://www.google.com/search?hl=en

&source=hp&q=define+hacker&gbv=2&oq=define+hacker&gs_l=heirloom-hp.3..0l8.970.3331.0.3785.13.12.0.0.0.0.313.2455.0j6j4j1.11.0....0...1ac.1.34.heirloom-hp..2.11.2455.cugAjlYB6sM

http://searchsecurity.techtarget.com/definition/cracker