+ All Categories
Home > Documents > FIND OUT MORE - Future Processing · 2019. 11. 4. · FIND OUT MORE TYPES OF HACKERS: concentrated...

FIND OUT MORE - Future Processing · 2019. 11. 4. · FIND OUT MORE TYPES OF HACKERS: concentrated...

Date post: 25-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
1
FIND OUT MORE www.future-processing.com TYPES OF HACKERS: concentrated on helping organisations and individuals to be more secure a conflicted hacker, doing both good and bad deeds focused on dangerous actions and retrieval of data EXAMPLES OF DANGERS: EAVESDROPPING SOFTWARE programme listening to private conversations ACCORDING TO OXFORD DICTIONARY A ‘HACKER’ IS: A person who uses computers to gain unauthorised access to data An enthusiastic and skilful computer programmer or user DENIAL OF SERVICE the overloading of servers with large numbers of requests KEYLOGGER programme which records keystrokes VIRUSES self-replicating, malicious programmes which spread easily PHISHING mimicking a well-known and trusted company or institution TROJANS malware disguised to look like legitimate software WHITE-HAT HACKER GREY–HAT HACKER BLACK–HAT HACKER
Transcript
Page 1: FIND OUT MORE - Future Processing · 2019. 11. 4. · FIND OUT MORE TYPES OF HACKERS: concentrated on helping organisations and individuals to be more secure a con˜icted hacker,

F I N D O U T M O R E

www.future-processing.com

TYPES O F HAC KER S:

concentrated on helping organisations

and individuals to be more secure

a conflicted hacker, doing both good

and bad deeds

focused on dangerous

actions and retrieval of data

EXAMPLES O F DA N GER S:

EAVESDROPPING SOFTWAREprogramme listening to private conversations

ACCORDI N G TO OXFORD DI CT I ONARY A ‘HACKE R’ I S :

A person who uses computers to gain unauthorised access to data

An enthusiastic and skilful computer programmer or user

DENIAL OF SERVICEthe overloading of servers with

large numbers of requests

KEYLOGGERprogramme which records keystrokes

VIRUSES self-replicating, malicious programmes which spread easily

PHISHINGmimicking a well-known

and trusted company or institution

TROJANS malware disguised to look like legitimate software

WHITE-HAT HACKER GREY–HAT HACKER BLACK–HAT HACKER

Recommended