You are on page 1of 15

Cyberhacking

Made by kylian m3a


INTRODUCTION
Hacker Purposes of Legal Prevention and
Categories Hacking Methods Cyber Hacking Consequences Protection:
Hacker Categories

White hat hackers


Legal, ethical Black Hat Hackers Gray Hat Hackers
Hackers, illegally Between,inform
Hacker Categories

Black Hat Hackers


White hat hackers
Legal, ethical
Hackers, illegally Gray Hat Hackers
Between,inform
Hacker Categories

Gray Hat Hackers


Between,inform
White hat hackers Black Hat Hackers
Legal, ethical Hackers, illegally
Hacking Methods
DDoS
Phising Malware
attacks
Hacking Methods
Phising
Malware DDoS
attacks
https://www.youtube.com/watch?v=ynul
iH
_AwxI
Hacking Methods
Phising
DDoS
Malware
attacks
Purposes of cyberhacking
Financial spionage Identity
gain

Money
Purposes of cyberhacking
Financial
gain spionage Identity

webcam
Purposes of cyberhacking
Financial
gain
spionage Identity
personality
Legal Consequences

Good Bad
Legal Consequences

Good Bad
Prevention and Protection
Two factor
authentication

Password
Prevention and Protection
Two factor authentication
https://www.youtube.com/watch?v=ynuliH_AwxI

Password

You might also like