GFW0018 W6 Poster (S2116309)
GFW0018 W6 Poster (S2116309)
Unethical Hacking
WHAT IS HACKING? WHO IS A HACKER?
Hack: Unconventional way of doing things. Early Days In 2000s
GFW0018 SECURITY AND ETHICS IN CYBERSPACE | NURUL HANIS BINTI MOHAMAD ZAMRI (S2116309)
White Hat Black Hat
Defenders are not aware of targets’ off limits,
Defenders are aware of the ground rules
Target and targets are chosen based on grudge or
pertaining to targets.
profit.
Responsibility Attacker takes responsibility for the Defender does not know who the attacker is,
to attack attack and the defender is aware of them. and may not be able to trace the attacker.
The hacker tries to gather a lot of Steps in detecting live hosts & The attacker gains access to
information about a system. services & uncovering vulnerabilities the systems and networks to
Processes: gathering information, in an organization’s network. control other systems related
determining an organization’s Types: port scanning, network to the organization.
network range, identifying an active scanning, vulnerability scanning.
machine, finding access points,
fingerprinting services.
COVER MAINTAINING
TRACKS ACCESS
REFERENCES
Arora, S. (2018, January 23). Webinar Wrap-up: The Five Phases of Ethical Hacking. Simplilearn.com. https://www.simplilearn.com/phases-
of-ethical-hacking-article
DianApps. (2019, October 18). Ethical Hacking and its Methodology. Medium. https://medium.com/@DianApps/ethical-hacking-and-its-
methodology-41468bc2ea67
Difference between Hackers and Crackers. (2020, May 17). GeeksforGeeks. https://www.geeksforgeeks.org/difference-between-hackers-
and-crackers/
What Is Penetration Testing? How Does It Work Step-by-Step? | HackerOne. www.hackerone.com. https://www.hackerone.com/knowledge-
center/what-penetration-testing-how-does-it-work-step-step
Name:Nurul Hanis binti Mohamad Zamri
Matric Number:S2116309
Course Code and Name:GFW0018 Security and Ethics in Cyberspace
Topic:Ethical vs Unethical Hacking
Furthermore,(2)tabulationsarealsousedtomakecomparisonsonseveralmatters,suchas
comparingblackhatandwhitehathackersasshownonPage2.Lastly,theposterisprepared
based on (3) subtle colour palette, featuring different shades of orange, blue, and grey to
have a subtle and clean presentationofthetopic.Toconclude,thedesignchoicesmadeare
based on the importance of the topic highlighted in the poster that can encourage easy
understanding,andalsobasedontheideaofhavingaposterdesignthatcancatertovarious
groups of people.