Infosavvy is a training institute that provides courses in IT management, information security, cyber security, and quality management. It discusses the definition of hacking as exploiting vulnerabilities to gain unauthorized access. There are three main types of hackers - white hat hackers who perform ethical security testing, black hat hackers who hack maliciously, and grey hat hackers who fall between the two.
2. About us
INFO-SAVVY
Infosavvy is a training institute providing
trainings and certifications in multiple
domains viz IT Management, Information
Security Management, Cyber Security &
Quality management to aspiring
technology professionals.
INFOSAVVY
www.info-savvy.com
4. What is Hacking?
Hacking in the field of computer security refers to
exploiting system vulnerabilities and compromising
security controls to gain unauthorized or
inappropriate access to system resources.
It involves modifying system or application features
to achieve a goal outside its creator's original
purpose.
www.info-savvy.com
INFOSAVVY
6. White hat hackers
Additionally called ethical hackers, try to work within
the public's best interest, instead of to make turmoil.
Many white hat hackers work doing penetration
testing, hired to try to interrupt into the company's
networks to search out and report on security
vulnerabilities. The protection companies then help
their customers mitigate security problems before
criminal hackers will exploit them.
www.info-savvy.com
INFOSAVVY
7. Intentionally gain unauthorized access to networks and
systems with malicious intent, whether or not to steal
information, unfold malware or benefit from ransom ware,
vandalism or otherwise injury systems or for the other
reason -- as well as gaining infamy. Black hat hackers are
criminals by definition because they violate laws against
accessing systems while not authorization, however they'll
additionally interact in different criminal activity, together
with fraud and distributed denial-of-service attacks
www.info-savvy.com
Black hat hackers
INFOSAVVY
8. Gary hat hackers
Fall somewhere between white hat hackers and black hat
hackers. Whereas their motives is also almost like those of
white hat hackers, grey hats are a lot of possible than white
hat hackers to access systems while not authorization; at
identical time, they're a lot of possible than black hat
hackers to avoid doing unneeded injury to the systems they
hack. Though they are not generally -- or solely -- actuated
by cash, Grey hat hackers could provide to fix vulnerabilities
they need discovered through their own, unauthorized,
activities instead of exploitation their information to use
vulnerabilities for illegal profit.
www.info-savvy.com
INFOSAVVY
9. Who is a Hacker?
Types of Hackers
A hacker is a person, who breaks into a system or network
without any authorization to destroy, steal sensitive data, or
performs malicious attacks. Hacker is an intelligent
individual with excellent computer skills, along with the
ability to create and explore into the computer's software
and hardware.
Usually a hacker would be a skilled engineer or programmer
with enough knowledge to discover vulnerabilities in a
target system. She/he is generally a subject expert and
enjoys learning the details of various programming
languages and computer systems.
www.info-savvy.com
INFOSAVVY
10. The subsequent list classifies hackers
consistent with their intent.
Ethical Hacker (White hat): A hacker WHO gains access to
systems with a read to fix the identified weaknesses. They will
additionally perform penetration Testing and vulnerability
assessments.
Cracker (Black hat): A hacker who gains unauthorized access
to pc systems for private gain. The intent is sometimes to steal
company information, violate privacy rights, transfer funds from
bank accounts etc.
www.info-savvy.com
INFOSAVVY
11. Grey hat: A hacker who is in between moral and black hat hackers.
He/she breaks into pc systems while not authority with a read to
spot weaknesses and reveals them to the system owner.
Hacktivist: A hacker who use hacking to send social, religious, and
political, etc. messages. This can be sometimes done by hijacking
web sites and exploit the message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in
telephones rather than computers.
Script kiddies: A non-skilled one that gains access to pc systems
using already created tools.
www.info-savvy.com
INFOSAVVY