SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
CYBER SECURITY
TRAINING INSTITUTE
INFOSAVVY
wwww.info-savvy.com
About us
INFO-SAVVY
Infosavvy is a training institute providing
trainings and certifications in multiple
domains viz IT Management, Information
Security Management, Cyber Security &
Quality management to aspiring
technology professionals.
INFOSAVVY
www.info-savvy.com
What is Hacking?
AND
Types of Hackers
www.info-savvy.com
INFOSAVVY
What is Hacking?
Hacking in the field of computer security refers to
exploiting system vulnerabilities and compromising
security controls to gain unauthorized or
inappropriate access to system resources.
It involves modifying system or application features
to achieve a goal outside its creator's original
purpose.
www.info-savvy.com
INFOSAVVY
WHITE HAT
HACKERS.
BLACK HAT
HACKERS
GARY HAT
HACKERS
TYPES OF HACKERS
www.info-savvy.com
INFOSAVVY
White hat hackers
Additionally called ethical hackers, try to work within
the public's best interest, instead of to make turmoil.
Many white hat hackers work doing penetration
testing, hired to try to interrupt into the company's
networks to search out and report on security
vulnerabilities. The protection companies then help
their customers mitigate security problems before
criminal hackers will exploit them.
www.info-savvy.com
INFOSAVVY
Intentionally gain unauthorized access to networks and
systems with malicious intent, whether or not to steal
information, unfold malware or benefit from ransom ware,
vandalism or otherwise injury systems or for the other
reason -- as well as gaining infamy. Black hat hackers are
criminals by definition because they violate laws against
accessing systems while not authorization, however they'll
additionally interact in different criminal activity, together
with fraud and distributed denial-of-service attacks
www.info-savvy.com
Black hat hackers
INFOSAVVY
Gary hat hackers
Fall somewhere between white hat hackers and black hat
hackers. Whereas their motives is also almost like those of
white hat hackers, grey hats are a lot of possible than white
hat hackers to access systems while not authorization; at
identical time, they're a lot of possible than black hat
hackers to avoid doing unneeded injury to the systems they
hack. Though they are not generally -- or solely -- actuated
by cash, Grey hat hackers could provide to fix vulnerabilities
they need discovered through their own, unauthorized,
activities instead of exploitation their information to use
vulnerabilities for illegal profit.
www.info-savvy.com
INFOSAVVY
Who is a Hacker?
Types of Hackers
A hacker is a person, who breaks into a system or network
without any authorization to destroy, steal sensitive data, or
performs malicious attacks. Hacker is an intelligent
individual with excellent computer skills, along with the
ability to create and explore into the computer's software
and hardware.
Usually a hacker would be a skilled engineer or programmer
with enough knowledge to discover vulnerabilities in a
target system. She/he is generally a subject expert and
enjoys learning the details of various programming
languages and computer systems.
www.info-savvy.com
INFOSAVVY
The subsequent list classifies hackers
consistent with their intent.
Ethical Hacker (White hat): A hacker WHO gains access to
systems with a read to fix the identified weaknesses. They will
additionally perform penetration Testing and vulnerability
assessments.
Cracker (Black hat): A hacker who gains unauthorized access
to pc systems for private gain. The intent is sometimes to steal
company information, violate privacy rights, transfer funds from
bank accounts etc.
www.info-savvy.com
INFOSAVVY
Grey hat: A hacker who is in between moral and black hat hackers.
He/she breaks into pc systems while not authority with a read to
spot weaknesses and reveals them to the system owner.
Hacktivist: A hacker who use hacking to send social, religious, and
political, etc. messages. This can be sometimes done by hijacking
web sites and exploit the message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in
telephones rather than computers.
Script kiddies: A non-skilled one that gains access to pc systems
using already created tools.
www.info-savvy.com
INFOSAVVY
Get in Touch
WWW.INFO-SAVVY.COM
THANK YOU
INFOSAVVY
+91 9987378932

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 

Similar a What is Hacking? AND Types of Hackers

Similar a What is Hacking? AND Types of Hackers (20)

Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Hacking
HackingHacking
Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hackers
HackersHackers
Hackers
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 

Último

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Último (20)

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

What is Hacking? AND Types of Hackers

  • 2. About us INFO-SAVVY Infosavvy is a training institute providing trainings and certifications in multiple domains viz IT Management, Information Security Management, Cyber Security & Quality management to aspiring technology professionals. INFOSAVVY www.info-savvy.com
  • 3. What is Hacking? AND Types of Hackers www.info-savvy.com INFOSAVVY
  • 4. What is Hacking? Hacking in the field of computer security refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources. It involves modifying system or application features to achieve a goal outside its creator's original purpose. www.info-savvy.com INFOSAVVY
  • 5. WHITE HAT HACKERS. BLACK HAT HACKERS GARY HAT HACKERS TYPES OF HACKERS www.info-savvy.com INFOSAVVY
  • 6. White hat hackers Additionally called ethical hackers, try to work within the public's best interest, instead of to make turmoil. Many white hat hackers work doing penetration testing, hired to try to interrupt into the company's networks to search out and report on security vulnerabilities. The protection companies then help their customers mitigate security problems before criminal hackers will exploit them. www.info-savvy.com INFOSAVVY
  • 7. Intentionally gain unauthorized access to networks and systems with malicious intent, whether or not to steal information, unfold malware or benefit from ransom ware, vandalism or otherwise injury systems or for the other reason -- as well as gaining infamy. Black hat hackers are criminals by definition because they violate laws against accessing systems while not authorization, however they'll additionally interact in different criminal activity, together with fraud and distributed denial-of-service attacks www.info-savvy.com Black hat hackers INFOSAVVY
  • 8. Gary hat hackers Fall somewhere between white hat hackers and black hat hackers. Whereas their motives is also almost like those of white hat hackers, grey hats are a lot of possible than white hat hackers to access systems while not authorization; at identical time, they're a lot of possible than black hat hackers to avoid doing unneeded injury to the systems they hack. Though they are not generally -- or solely -- actuated by cash, Grey hat hackers could provide to fix vulnerabilities they need discovered through their own, unauthorized, activities instead of exploitation their information to use vulnerabilities for illegal profit. www.info-savvy.com INFOSAVVY
  • 9. Who is a Hacker? Types of Hackers A hacker is a person, who breaks into a system or network without any authorization to destroy, steal sensitive data, or performs malicious attacks. Hacker is an intelligent individual with excellent computer skills, along with the ability to create and explore into the computer's software and hardware. Usually a hacker would be a skilled engineer or programmer with enough knowledge to discover vulnerabilities in a target system. She/he is generally a subject expert and enjoys learning the details of various programming languages and computer systems. www.info-savvy.com INFOSAVVY
  • 10. The subsequent list classifies hackers consistent with their intent. Ethical Hacker (White hat): A hacker WHO gains access to systems with a read to fix the identified weaknesses. They will additionally perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to pc systems for private gain. The intent is sometimes to steal company information, violate privacy rights, transfer funds from bank accounts etc. www.info-savvy.com INFOSAVVY
  • 11. Grey hat: A hacker who is in between moral and black hat hackers. He/she breaks into pc systems while not authority with a read to spot weaknesses and reveals them to the system owner. Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This can be sometimes done by hijacking web sites and exploit the message on the hijacked website. Phreaker: A hacker who identifies and exploits weaknesses in telephones rather than computers. Script kiddies: A non-skilled one that gains access to pc systems using already created tools. www.info-savvy.com INFOSAVVY
  • 12. Get in Touch WWW.INFO-SAVVY.COM THANK YOU INFOSAVVY +91 9987378932