F I N D O U T M O R E
www.future-processing.com
TYPES O F HAC KER S:
concentrated on helping organisations
and individuals to be more secure
a conflicted hacker, doing both good
and bad deeds
focused on dangerous
actions and retrieval of data
EXAMPLES O F DA N GER S:
EAVESDROPPING SOFTWAREprogramme listening to private conversations
ACCORDI N G TO OXFORD DI CT I ONARY A ‘HACKE R’ I S :
A person who uses computers to gain unauthorised access to data
An enthusiastic and skilful computer programmer or user
DENIAL OF SERVICEthe overloading of servers with
large numbers of requests
KEYLOGGERprogramme which records keystrokes
VIRUSES self-replicating, malicious programmes which spread easily
PHISHINGmimicking a well-known
and trusted company or institution
TROJANS malware disguised to look like legitimate software
WHITE-HAT HACKER GREY–HAT HACKER BLACK–HAT HACKER