Professional Documents
Culture Documents
Programme: B. Tech. IT
Semester: 7th
Year:2023
Session: 2020-2024
Faculty: Dr. Pankaj Pal
Hackers and Cyber Crimes
Hackers
Hackers are unauthorized users of a system who invade
a system through the vulnerabilities or weak points in
the system.
• Hackers makes use of large diverse tools to harm a
computer system.
• Hackers usually gain access to computer systems
through malicious logic (like virus or malware) through
some attachments and waiting for users to open the
attachments.
• These attachments implant viruses or malwares for
unwanted operations or destructions through
malicious logic.
Cyber Crimes
1. Black Hat
2. White Hat
3. Grey Hat
4. Blue Hat
5. Red Hat
6. Green Hat
7. Script Kiddie
Black Hat
Nothing really. Red Hat hackers are similar to White Hat ones,
in the sense that they are working to put a stop to Black Hat
attacks on your business. But you probably won’t know about
it.
To put a stop to people they know to be Black Hat hackers. But
they are downright scary in how they go about it. They
essentially take the Black Hat’s arsenal and turn it back against
them. Using malware, DoS attacks, viruses and Trojan Horses
to destroy their machines from the inside out. It’s a pretty
effective way of stopping them from attacking anyone else!
Its Motive: Vigilante justice.
Green Hat