You are on page 1of 12

Dilla don Bosco high

school and preparatory


school
ICT ASSIGNMENT FOR GRADE 9B
Graphics
presentation
and design

by

noah
and
Robsen
hackers
Prepared by :- Robsen merga
Noah ageze
Who are hacker?
 A hacker is a highly skilled person on cyber security, computer system and
networks. In other word they are master of computer world .
 Hacking often refers to unauthorized intrusion into a network or computer;
normally carried out by one or more hackers. However a hacker can be any
one.
 They can work solo or be employed by an organization that has the motive to
disrupt something or cause havoc unnecessarily. Often they look to alter
security system to achieve their goal, which differ from the actual purpose of
the system.
 There are many organization who hire hackers as part of their staff. These
hackers use their skills to find flaws, vulnerable areas, and weak spots in the
organization’s security system. This is done to find the weaknesses and
prevent malicious hackers from breaking in the security system.
Type of hackers
1. Black hat hacker :-
 The activity of hacker can be 1. Classic black hat hacker
harmful or useful. If hacker tries to
2. Suicide hacker
steal any private data money
etc…,this type of hacker is illegal 2. White hat hacker :-
but if he/she use this expertise for
1. White hat hacker
securing any system from other
hackers then they are ethical 2. Red hat hacker
hacker. 3. State/Nation sponsored hacker
 So based on this a hacker can be 3. Grey hat hacker :-
grouped in main three group.
1. Grey hat hacker
These main groups and their sub
groups are stated to the right. 2. Malicious insider or whistleblower
Black hat hacker
Classic black hat hacker
 Motivation : personal gain, money, Data
 Action : steal, destroy, and manipulate.
 Behavior : illegal
 These hackers are the most dangerous hacker types. Their main motivation is
using their knowledge to gain critical data, steal money from accounts & etc.
 This type of hackers create malware & other harmful programs & with these
programs, they detect the vulnerabilities of the system.
 After entering the system, they can learn important business, personal or
financial private data. They can destroy the systems and manipulate
computer system behavior.
 Generally they are the one who are behind many critical cyber crimes. They
work in the dark pat of the web.
Suicide hacker

 Motivation : money, revenge


 Actions : steal critical data
 Behaviors : illegal

 Suicide hacker are the ones who knows that they will caught by the
cyber teams. Although knowing this, he/she acts and hacks the
systems. This is like suicide bombers. The main motivation of this
group is high money offer or a big revenge from their enemies.
White hat hacker
1. White hat hacker
 Motivation : provide security
 Action : cyber security activities
 Behaviors : legal
 White hat hacker are the golden guys in the computer world. They are
ethical hackers. They are the heroes of government and many
organization who need cyber security.
 They are the computer system expert who has an excellent knowledge like
the black. The key deference is the one steal data as a thief, and the
other wait in the door like a guard.
 During integration & operation, system can have many back holes. Ethical
hackers detect it by many way, after that they close it.
 So generally they are security provider for cyber institution.
2.Red hat hacker

 Motivation : revenge
 Actions : cyber security activities & attack back
 Behavior : legal aggressive
 They are white hat hacker with only a little difference. Red hat hacker do
not defend only. He/she also attack backs to the hacker.
 Here the main aim is not only detect the vulnerabilities and defend toward
the hacker but also defeating the hacker.
 As a summery red hat hackers are good but a little aggressive guys. They
would like to defeat the evil in its house.
“ who knows, may be the best defense is offence sometime. “
3.State/Nation sponsored hackers

 Motivation : government cyber security


 Actions : cyber security activities
 Behaviors : legal
 They are white hat hacker who defends the national system as a cyber
security team. They are the guards at the doors of the government
system.
 With advanced tools they provide the security of system and network
toward any black hat hacker.
 They defend the country so they re highly paid hackers.
 Generally they are hackers sponsored by governments. They defend
critical government system from internal and external attack.
Grey hat hackers
1. Classic grey hat hacker
 Motivation : data gain
 Actions : steal critical data
 Behavior : illegal
 They are b/n black and white hat hackers. They are not black because
they don not use their knowledge for a personal gain. But they are also not
white since reaching critical data with out any permission is not legal.
 This type of hacker can’t work legally in an organization. But at the back
plane, they are working. Grey hat hackers are the most crowded hacker
groups on internet
 Generally grey hat hacker are data hunter. They are dangerous especially
for the organization that has critical data.
2.Malicious insider or whistleblower

 Motivation : commercial data gain


 Actions : steal critical data
 behavior : illegal
 They are the hacker who serve to an organization to get information
about their rivals. This type of hacker is also grey hat hacker that can
reach critical data illegally.
 They can use many hacking tools to access any rival company servers
and learn critical data for his company.
 As summary malicious insider or whistleblower is the grey hat hacker
used some organizations against their rivals. They are harmful for their
rivals.

You might also like