You are on page 1of 9

Online security:

IT security is the protection of


computer systems from theft or
damage to their hardware,
software or electronic data, as well
as from disruption or misdirection
of the services they provide.
The difference between security and
protection:
 Security and protection are very close concepts , but are not the same.
 Security measures are adopted to increase the level of protection.
 The feeling of protection arises when one has enough security measures.
 Security is a type of protection against external threats.
Overview of Hacking:
 Hacking is the act of stealing personal or private data, without the
owner's knowledge or consent, it could also include other things
like stealing passwords, creating a bot net, or pretty much any act
that breaches someone's privacy, without their knowledge, or
consent.
 The difference between a hacker and a cracker, is that a hacker
is someone that uses their extensive knowledge of computer logic
and codes for malicious purposes, while a cracker - looks for back
doors in programs, and exploits those back doors.
 Cracking is generally less harmful than hacking. Cracking is
different to hacking, Cracking is where someone edits a program
source code in a software so that the code can be exploited or
changed for a specific purpose. This is usually done to hurt
someone while hacking sometimes is not to hurt someone.
Types of hackers:
1. White hat hackers:
• Also known as ethical hackers.
• Help governments and organizations.
• Ensure protection from black hat hackers.

2. Black hat hackers:


• Use their skill maliciously for personal gain.
• Hack banks, steal credit cards and deface websites.
3. Grey hat hackers:
• Combination of white and black hat hackers.
• Don’t hack for personal gain.
• Aren’t legally authorized to hack the organizations’
cybersecurity.

4. Sloppy hackers:
• Their primary purpose is to impress their friends or gain
attention.
Why do Hackers Attack?
 Because they can
 A large fraction of hacker attacks have been pranks
 Financial Gain
 Espionage [spying]
 Venting anger at a company or organization
 Terrorism
Hacking and ethical hacking:

 Hacker
• Access computer system or network without authorization.
• Breaks the law.

 Ethical Hacker
• Performs most of the same activities
but with owner’s permission.
• Employed by companies to perform Penetration Tests.

You might also like