7
ARE YOU AWARE OF THESE ONLINE SECU RITY HACKERS?

Are you aware of these online security hackers

Embed Size (px)

Citation preview

Page 2: Are you aware of these online security hackers

White Hat Hacker•These types of hackers have non-malicious intent behind their attempts. Most White Hat Hackers do it to test vulnerabilities in a client’s system or check their own security system.

•They utilize their skills to improve the security of software by exposing vulnerabilities before these are detected by malicious attackers.

Page 3: Are you aware of these online security hackers

Black Hat Hacker•These make malicious hacking attempts in order to breach the security of a computer system or software.

•Taking advantage of security weaknesses, these attackers break into computer systems and networks.

•These type of hackers can cause major damage to individual computer users and organizations by stealing their confidential information.

Page 4: Are you aware of these online security hackers

Grey Hat Hacker•This category lies between the Black and White Hat categories.

•Attempts are made to random computer systems on the internet with the intent to notify the administrator about the security defect.

•These hackers offer corrective measures for the defect in return for some fee.

•At times, they also publish the defects of a system to all over the world, instead of its administrator.

Page 5: Are you aware of these online security hackers

Elite Hacker•These come amongst the most skilled ones in their field.

•They work on cutting edge technologies in network and computer industry and are aware of all the latest exploits.

•There are several renowned elite hacking groups around the world. One such New-York based group is ‘Masters of Deception’ most widely known in media for their exploits of telephone company infrastructure and later prosecution.

Page 6: Are you aware of these online security hackers

Blue Hat Hacker•These types of hackers make hacking attempts as a result of bug testing for a system prior to its launch.

•This is done to close various security exploits that are present in the system.

Page 7: Are you aware of these online security hackers

THANK YOU!Visit REVE Antivirus for more tips!