Top Banner
HACKER PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934
4

PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934.

Dec 29, 2015

Download

Documents

Alvin Pitts
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934.

HACKER

PARTFOLIO: BY GROUP

MOHAMAD SHAZWAN BIN DAUD 2010404846NUR’ ARINA ATIQAH BT ASRAR2010438934

Page 2: PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934.

Hacker A person who maliciously

cracks software and or passwords.

Hacking  means finding out weaknesses

in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks.

Cracker someone who breaks into

someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security

Page 3: PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934.

White hat A white hat cracker breaks security for non-malicious reasons, perhaps

to test their own security system. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration test and vulnerability assessment  within a contractual agreement.

Black hat A Black Hat Hacker is a hacker who "violates computer security for

little reason beyond maliciousness or for personal gain"(Moore,2005). Black Hat Hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".  Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network

CLASSIFICATIONS HACKERS

Page 4: PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934.

Techniques

Vulnerability scanner

Password cracking

Packet sniffer

Phishing Rootkit