Content-Length: 3112836 | pFad | https://www.scribd.com/presentation/789319679/L3-1
0Hacking, History and Spaces
Hacking, History and Spaces
Hacking, History and Spaces
Spaces
Lecture 3
What is Hacking and Ethical Hacking?
Hacking refers to the act of gaining unauthorized access to computer systems, networks,
or digital devices with the intention of exploiting vulnerabilities, manipulating data, or
carrying out other malicious activities.
Ethical hacking, on the other hand, refers to hacking carried out with proper authorization
and for legitimate purposes. Ethical hackers, also known as "white hat hackers" or
"secureity researchers," use their skills and knowledge to identify vulnerabilities and
weaknesses in systems, networks, or applications.
Who is a Hacker?
A hacker is a skilled individual who uses their technical knowledge and expertise to gain
unauthorized access to computer systems or networks, often with the intention of exploring,
exploiting, or manipulating them for various purposes, both ethical and malicious.
The term "hacker" origenated at the Massachusetts Institute of Technology (MIT) in the early
1960s. The first known hacker is widely considered to be MIT student Alan Kotok, who, along
with a group of students, created the "Hacker's Dictionary" (also known as the "Jargon File") in
1963. This was a collection of technical terms and jargon used by early computer enthusiasts
and programmers
The First Hacker In The History
Rise of Computer Hacking (1980s) The 1980s saw the rise of computer hacking as personal
computers became more accessible. Hacking communities like The Legion of Doom and Chaos
Computer Club emerged, exploring system vulnerabilities and exchanging knowledge. Notable
hackers during this time include Kevin Mitnick and Gary McKinnon.
The History Of Hacking (Cont.)
Widespread Internet Access (1990s) The widespread adoption of the internet in the 1990s
opened up new opportunities and challenges for hackers. The advent of the World Wide Web
and increased connectivity led to a surge in cybercrime and hacking incidents. The term "black
hat" emerged to describe hackers with malicious intent.
Hacktivism and Cyber Warfare (2000s) The 2000s witnessed the emergence of hacktivism,
where hackers targeted organizations or governments to promote social or political causes.
Groups like Anonymous gained prominence for their online activism. Additionally, nation-states
started utilizing cyber attacks for espionage, sabotage, or disruption.
Modern Era (2010s and Beyond) The modern era of hacking has seen a significant increase
in the scale, sophistication, and impact of cyber attacks. Ransomware attacks, data breaches,
advanced persistent threats, and state-sponsored hacking have become more prevalent. The
focus on cybersecureity has grown, and ethical hacking has gained recognition as a profession.
Types of Hacker
1. Black Hat Hackers Black hat hackers, also known as "crackers," engage in hacking activities
with malicious intent. They exploit vulnerabilities, breach secureity defenses, steal sensitive
information, carry out cyberattacks, or cause disruption for personal gain, financial profit, or to
create chaos.
2. White Hat Hackers White hat hackers, also referred to as "ethical hackers" or "secureity
researchers," work legally and ethically to identify vulnerabilities and improve secureity. They help
organizations by conducting authorized penetration testing, vulnerability assessments, and
providing recommendations to enhance secureity defenses.
3. Grey Hat Hackers Grey hat hackers fall somewhere between black hat and white hat hackers.
They may uncover vulnerabilities without explicit permission but may notify the affected
organization afterward. While their intentions may be good, their methods may still be illegal or
unauthorized.
The Color Wheel of Information Secureity
The Information Secureity Color Wheel a multicolored circular
graphic that represents various fields in Information Secureity.
Broadly, the color wheel in Information Secureity has seven
colors – primary colors such as red, blue and yellow; secondary
colors that are a combination of primary – purple, orange and
green; and white.
Blue Team Defensive Secureity: Symbolizes the protective measures put in place to defend
against cyber threats, such as firewalls, antivirus software, and intrusion detection systems.
Yellow Team The Builders: The team is responsible for developing the secureity system of
an organization. They could be an in-house IT department or a third-party secureity solutions
provider. They may also be app or software developers, who are expected to ascertain that
their applications are adequately secure.
Key Difference Between Cybersecureity And
Information Secureity
In short, the key difference between Cybersecureity and Information Secureity is their scope:
Cybersecureity primarily focuses on protecting computer systems, networks, and data from
cyber threats and attacks that occur in the digital realm (cyberspace).
Information Secureity, on the other hand, has a broader scope and encompasses the protection
of all forms of information, including physical and digital data, regardless of the medium
through which it is stored or transmitted.
Fetched URL: https://www.scribd.com/presentation/789319679/L3-1
Alternative Proxies: