COMPUTER HACKING
What is Computer Hacking?
Hacking is the act of identifying and then
exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to
personal or organizational data. Hacking is not
always a malicious activity, but the term has
mostly negative connotations due to its
association with cybercrime.
Types Of Hackers
TYPES OF HACKER
White hat hackers – sometimes also called “ethical
hackers” or “good hackers” – are the antithesis
of black hats. They exploit computer systems or
networks to identify their security flaws so they
can make recommendations for improvement.
TYPES OF HACKER
A black hat - is a computer hacker who violates
laws or typical ethical standards for nefarious
purposes, such as cybercrime, cyberwarfare or
malice. The term originates from 1950s westerns,
when bad guys typically wore black hats and good
guys white hats. A black hat is contrasted with a
white hat
TYPES OF HACKER
A grey hat is a computer hacker or computer
security expert who may sometimes violate laws or
typical ethical standards, but usually does not have
the malicious intent typical of a black hat hacker.
The term came into use in the late 1990s, and was
derived from the concepts of "white hat" and
"black hat" hackers.
The Motivations for Hacking
Monetary gain is perhaps the most common reason
for hackers to attack an organization or an
individual. In these cases, threat actors (often
affiliated with cybercrime gangs) target companies
they believe will pay a ransom to recover stolen
information.
Types Of Attack
Types Of Attack
Keyloggers are a particularly insidious type of
spyware that can record and steal consecutive
keystrokes (and much more) that the user enters on
a device. The term keylogger, or “keystroke
logger,” is self-explanatory: Software that logs
what you type on your keyboard
Types Of Attack
Denial-of-service attack is a cyber-attack in which
the perpetrator seeks to make a machine or
network resource unavailable to its intended users
by temporarily or indefinitely disrupting services
of a host connected to a network.
Types Of Attack
“Phishing” refers to an attempt to steal sensitive
information, typically in the form of usernames,
passwords, credit card numbers, bank account
information or other important data in order to
utilize or sell the stolen information.
Types Of Attack
Watering hole attack- is a security exploit that
compromises a site that a targeted victim visits to
gain access to the victim's computer and network
Types Of Attack
Impersonation attack- is a type of targeted
phishing attack where a malicious actor pretends to
be someone else or other entities to steal sensitive
data from unsuspecting employees using social
engineering tactics. Hackers attempt to trick the
victim into transferring money, giving up sensitive
information
Types Of Attack
Pharming - is online fraud that involves the use of
malicious code to direct victims to spoofed
websites in an attempt to steal their credentials and
data.
Types Of Attack
Clickjacking - is an attack that tricks a user into
clicking a webpage element which is invisible or
disguised as another element.
Types Of Attack
Cookie theft -refers to a cyberattack where a
hacker gets access to the user's cookie data, small
files websites store on the user's device. Cookie
theft (also called cookie hijacking) can result in the
attacker gaining access to the user's name, home
address, telephone number, and other sensitive
information.
Types Of Attack
Man-in-the-middle attack - is a cyberattack where
the attacker secretly relays and possibly alters the
communications between two parties who believe
that they are directly communicating with each
other, as the attacker has inserted themselves
between the two parties.
Types Of Attack
Spyware - is malicious software that enters a user's
computer, gathers data from the device and user,
and sends it to third parties without their consent.
6 easy tips to avoid Hacker
1. Maintain strong password.
2. Set up and us Multi-Factor Authentication.
(MFA)
3. Be wary of suspicious emails.
4. Don’t open attachments in suspicious emails.
5. Install security updates for your system as soon
as they lunch.
6. Avoid using public wifi.