SlideShare a Scribd company logo
Hacking Presentation
1. What is hacking?
2. Types of Hackers
3. Difference between Hackers and
Crackers
4. Criminological theories
5. Academic Studies
• Definition: A hacker or hackers are commonly known as
someone who seeks to exploit weaknesses within
a computer system or network. Hackers can be
associated as a community that works together to
attack a computer or network.
Short Definition: To gain access to (a computer file or network)
illegally or without authorization. (The Free
Dictionary, 2013)
Look at the word cloud below and see if you can identify any meanings
towards the words.

Towards the end of topic 1 the words cloud will help you to associate meanings and
theories to these words.
• The definition of a hacker has been in a long
strand of controversy about what a true hacker
definitions really is and why an individual or
community decide to attack specific
organisations.

“Despite, decades of computer security
research, billions spent on secure operations, and
growing training requirements, we seem incapable
of operating computer securely.” („The
Cybersecurity Risk‟, 2012).
A hacker has to understand computers to an advanced
level. However, it is important to note that there are two
types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a
weaknesses within their computer network.
Or

• A unethical hacker hacks into a system to steal or view
information on purpose.
To understand more about
Hackers and the various types
Please watch the go animate
Videos called
“Groups of Hackers”.
Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1
http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu
m=linkshare&utm_campaign=usercontent

Hackers Hat (White) – GoAnimate Scene 2
http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc
ontent

Hackers Hat (Grey) – GoAnimate Scene 3
http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi
um=linkshare&utm_campaign=usercontent
The title hacker is given to anyone breaking into a
computer. However, professional in the industry argue that
there should be two terms hackers and crackers.
Computer criminals are often seen as committing a
cybercrime through breaking into someone's computer or
computer network known as committing a criminal offence
commonly known as – „Black Hat‟. These types of people
should be called CRACKERS!

Instead of someone known as a computer security expert –
„White Hat‟. These types of people should be called
HACKERS!
Below is some criminological theories presented in hackers research. Please take
note of some of these theories and in your own time research them in more depth.

Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become
Computer Hackers'
Below is some academic studies presented on hackers research. Please take note
of some of these studies and in your own time research them in more depth.

Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
When each section of the material has been read please take
time out and go back onto the Moodle course and locate the
link called „Topic 1 – Hackers Journal‟ .
Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778

Please write down what you have learnt from this PowerPoint
and continue to reflect back on your journal every time a
material has been read in Moodle. This will ultimately help
you to complete your assessment at the end of the course.
Thank You
Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.
Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier.
GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013).
Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press.
Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political
science. London: Yale university Press.
Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier
No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source
Elite, EBSCOhost. Available at:
http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013).
Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological
Review 22 (6), pp. 664–670, JSTOR. Available at:
http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November
2013).
The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27
November 2013).
Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer
Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at:
http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87
497819 (Accessed: 27 November 2013).

More Related Content

PPT
Hacking Tutorial in Telugu
PPTX
Hacking Vs Cracking in Computer Networks
PPTX
Hacking and Hackers
PDF
The History of Hacking in 5minutes (for dummie)
PPTX
National information security education & awareness program
PPT
Introduction to ethical hacking
PPTX
hacking presentation slide
Hacking Tutorial in Telugu
Hacking Vs Cracking in Computer Networks
Hacking and Hackers
The History of Hacking in 5minutes (for dummie)
National information security education & awareness program
Introduction to ethical hacking
hacking presentation slide

What's hot (20)

PPTX
Ethical hacking by chandra prakash upadhyay
PPT
the best hacking ppt
PPTX
Ethical hacking presentation
PPTX
Secure Shell - a Presentation on Ethical Hacking
PPTX
Windows Hacking
PPTX
ethical hacking
PPSX
Ethical Hacking, Its relevance and Its Prospects
PPTX
Ethical hacking presentation
PPTX
PPTX
Hacking ppt
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPT
basic knowhow hacking
PDF
DOCX
Ethical Hacking
PPTX
Ethical hacking ppt
PPT
Ethical Hacking and Network Security
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
ethical hacking in the modern times
PPT
Ethical Hacking
RTF
Hacking and its types
Ethical hacking by chandra prakash upadhyay
the best hacking ppt
Ethical hacking presentation
Secure Shell - a Presentation on Ethical Hacking
Windows Hacking
ethical hacking
Ethical Hacking, Its relevance and Its Prospects
Ethical hacking presentation
Hacking ppt
Basic of Ethical Hacking and Penetration Testing - 1st Module
basic knowhow hacking
Ethical Hacking
Ethical hacking ppt
Ethical Hacking and Network Security
Ethical hacking-presentation-updated(1by )Rasheed
ethical hacking in the modern times
Ethical Hacking
Hacking and its types

Viewers also liked (20)

PPTX
Theft act 1968- theft, robbery and burglary
PPTX
Legal (Types of Cyber Crime)
PPT
Cyber crime
PPTX
Cyber Space
PPTX
Cyber Crime & Security
PDF
Cybercrime And Computer Misuse Cases
PPTX
Computer Crimes
PPTX
Cyber crime
PPTX
Cyber crime types & laws
PPTX
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
PDF
Cyber crime
PPTX
Lesson 11 The Computer as The Teachers Tool
PPTX
Cooperative Learning with the Computer
PPTX
Lesson 9 educational technology 10
PPTX
Ethical issues in cyberspace
PPTX
eductech 2 Lesson 16 Mary Rose Ebora
PPTX
UNDERSTANDING HYPERMEDIA
PPT
Cybercrime
PPTX
The computer as the teacher’s tool.pptx a
PPTX
The software as an educational resource copy
Theft act 1968- theft, robbery and burglary
Legal (Types of Cyber Crime)
Cyber crime
Cyber Space
Cyber Crime & Security
Cybercrime And Computer Misuse Cases
Computer Crimes
Cyber crime
Cyber crime types & laws
UNDERSTANDING HYPERMEDIA--EDUCATIONAL TECHNOLOGY 2
Cyber crime
Lesson 11 The Computer as The Teachers Tool
Cooperative Learning with the Computer
Lesson 9 educational technology 10
Ethical issues in cyberspace
eductech 2 Lesson 16 Mary Rose Ebora
UNDERSTANDING HYPERMEDIA
Cybercrime
The computer as the teacher’s tool.pptx a
The software as an educational resource copy

Similar to Hacking Presentation (20)

PPTX
Hacking ppt
PPT
ethics final project
PPT
Introduction TO Ethical Hacking
DOCX
The history of hackers lab 2 of ict
PDF
Ka3118541860
PPTX
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
PDF
Hackers and hacking in bangladesh
PPTX
Hacking
DOCX
Ethical hacking
PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
PPT
Introduction To Ethical Hacking
PDF
hackers
PPTX
Hacking and Civic Hacking
PPTX
Ethical Hacking
PPTX
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
PPT
Efficient Use of Internet and Social Media Tools in Innovation Processes
PDF
Deep-Dive-AI-final-report.pdf
PDF
Case Study On Social Engineering Techniques for Persuasion Full Text
PDF
Selected advanced themes in ethical hacking and penetration testing
ODP
Program For The Future: The Commons as a collective intelligence meta-innovation
Hacking ppt
ethics final project
Introduction TO Ethical Hacking
The history of hackers lab 2 of ict
Ka3118541860
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Hackers and hacking in bangladesh
Hacking
Ethical hacking
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
Introduction To Ethical Hacking
hackers
Hacking and Civic Hacking
Ethical Hacking
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Efficient Use of Internet and Social Media Tools in Innovation Processes
Deep-Dive-AI-final-report.pdf
Case Study On Social Engineering Techniques for Persuasion Full Text
Selected advanced themes in ethical hacking and penetration testing
Program For The Future: The Commons as a collective intelligence meta-innovation

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Insiders guide to clinical Medicine.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Classroom Observation Tools for Teachers
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Lesson notes of climatology university.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Anesthesia in Laparoscopic Surgery in India
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
RMMM.pdf make it easy to upload and study
Insiders guide to clinical Medicine.pdf
Pre independence Education in Inndia.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Classroom Observation Tools for Teachers
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharma ospi slides which help in ospi learning
PPH.pptx obstetrics and gynecology in nursing
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Hacking Presentation

  • 2. 1. What is hacking? 2. Types of Hackers 3. Difference between Hackers and Crackers 4. Criminological theories 5. Academic Studies
  • 3. • Definition: A hacker or hackers are commonly known as someone who seeks to exploit weaknesses within a computer system or network. Hackers can be associated as a community that works together to attack a computer or network. Short Definition: To gain access to (a computer file or network) illegally or without authorization. (The Free Dictionary, 2013)
  • 4. Look at the word cloud below and see if you can identify any meanings towards the words. Towards the end of topic 1 the words cloud will help you to associate meanings and theories to these words.
  • 5. • The definition of a hacker has been in a long strand of controversy about what a true hacker definitions really is and why an individual or community decide to attack specific organisations. “Despite, decades of computer security research, billions spent on secure operations, and growing training requirements, we seem incapable of operating computer securely.” („The Cybersecurity Risk‟, 2012).
  • 6. A hacker has to understand computers to an advanced level. However, it is important to note that there are two types of hackers ethical and unethical: • A ethical hacker is paid by an organisation to identify a weaknesses within their computer network. Or • A unethical hacker hacks into a system to steal or view information on purpose. To understand more about Hackers and the various types Please watch the go animate Videos called “Groups of Hackers”.
  • 7. Go Animate material provided on Moodle „Groups of Hackers‟: Hackers Hat (Black) – GoAnimate Scene 1 http://goanimate.com/videos/0LOysihv_toU?utm_source=linkshare&utm_mediu m=linkshare&utm_campaign=usercontent Hackers Hat (White) – GoAnimate Scene 2 http://goanimate.com/videos/0TIJPUI7XJY?utm_source=linkshare&utm_medium=linkshare&utm_campaign=userc ontent Hackers Hat (Grey) – GoAnimate Scene 3 http://goanimate.com/videos/0UswlV_egtJY?utm_source=linkshare&utm_medi um=linkshare&utm_campaign=usercontent
  • 8. The title hacker is given to anyone breaking into a computer. However, professional in the industry argue that there should be two terms hackers and crackers. Computer criminals are often seen as committing a cybercrime through breaking into someone's computer or computer network known as committing a criminal offence commonly known as – „Black Hat‟. These types of people should be called CRACKERS! Instead of someone known as a computer security expert – „White Hat‟. These types of people should be called HACKERS!
  • 9. Below is some criminological theories presented in hackers research. Please take note of some of these theories and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p66) 'Why Computer Talents Become Computer Hackers'
  • 10. Below is some academic studies presented on hackers research. Please take note of some of these studies and in your own time research them in more depth. Zhengchaun, QIing and Chenghong (2013, p67) 'Why Computer Talents Become Computer
  • 11. When each section of the material has been read please take time out and go back onto the Moodle course and locate the link called „Topic 1 – Hackers Journal‟ . Direct Link: - http://moodle2.newman.ac.uk/1314/mod/journal/view.php?id=109778 Please write down what you have learnt from this PowerPoint and continue to reflect back on your journal every time a material has been read in Moodle. This will ultimately help you to complete your assessment at the end of the course. Thank You
  • 12. Akers, R.L. (1947) Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press. Gibbs, J.P. (1975) Crime, Punishment, and Deterrence. New York: Elsevier. GoAnimate (2013) „GoAnimate‟. Available at: http://goanimate.com/ (Accessed: 27 November 2013). Gottfredson, M. and Hirschi, T. A. (1990) General Theory of Crime. Stanford: Stanford university Press. Green, D.P. and Shapiro, I. (1994) Pathologies of rational Choice theory: a Critique of applications in Political science. London: Yale university Press. Moore, R (2005). Cybercrime: Investigating High Technology Computer Crime.. Oxford: Elsevier No Author (2012) 'The Cybersecurity Risk„ , Communications Of The ACM, 55 (6), pp. 29-32, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=851bf209-3d2b-49e5-b7e571823223d0b1%40sessionmgr198&vid=7&hid=126 (Accessed: 27 November 2013). Sykes, G.M. and Matza, D. (1957) Techniques of neutralization: a theory of delinquency. American Sociological Review 22 (6), pp. 664–670, JSTOR. Available at: http://www.jstor.org/discover/10.2307/2089195?uid=2&uid=4&sid=21103007919401 (Accessed: 27 November 2013). The Free Dictionary (2013) Hacking. Available at: http://www.thefreedictionary.com/hacking (Accessed: 27 November 2013). Zhengchuan, X, Qing, H, & Chenghong, Z. (2013) 'Why Computer Talents Become Computer Hackers', Communications Of The ACM, 56 (4), pp. 64-74, Business Source Elite, EBSCOhost. Available at: http://web.ebscohost.com/ehost/detail?sid=c21ddb2c-7ad9-45d1-8cb11735dde726a4%40sessionmgr15&vid=3&hid=112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bsh&AN=87 497819 (Accessed: 27 November 2013).