0% found this document useful (0 votes)
20 views3 pages

GFW0018 W6 Poster (S2116309)

Uploaded by

Hanis Zamri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

GFW0018 W6 Poster (S2116309)

Uploaded by

Hanis Zamri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Ethical vs

Unethical Hacking
WHAT IS HACKING? WHO IS A HACKER?
Hack: Unconventional way of doing things. Early Days In 2000s

Hacker: Someone who wants to do things more Programming Information is now


efficiently, or someone who commits criminal acts students who a valuable asset,
that may cause social disruption. played pranks and creates criminal
challenged each opportunities &
other to get peer have to be
TYPES OF HACKERS THAT EXIST recognition. protected.

White hat hacker Ideological


incentives
Economic
incentives
Ethical security hacker
Acts legally and trustworthy for
organizations that may purchase their
services

Black hat hacker


Unethical hacker that violates laws

Grey hat hacker Acts maliciously against a victim - an individual, a


company or an organization
Computer hacker that may / may not violate Can commit crimes alone or together within a
laws or ethical standards criminal network
May act illegally to help achieving their goals
Will avoid unnecessary harm and try to
minimize potential fraudulent activities
Red hat hacker Blue hat hacker
Chase and stop black hat hackers Ethical, amateur hacker to seek
Vigilants, who use aggressive revenge
methods
Pen testers: Breach a system with a permission No desire to learn

to identify vulnerabilities in the system.


Crackers: Use, exploit and manipulate a system
Green hat hacker
for personal gain. Amateur hacker with a desire to learn to hack
Hacktivists: For political or social purposes like professionally
trespassing into a bank’s system. Want to be recognized and accepted in the
hacking community

MODERN HACKERS TODAY’S HACKERS


Skilled programmers and computer experts that focus The emergence of new categories of hackers: state-
on vulnerable software & network. sponsored hackers, spy hackers or even cyber-terrorists.

GFW0018 SECURITY AND ETHICS IN CYBERSPACE | NURUL HANIS BINTI MOHAMAD ZAMRI (S2116309)
White Hat Black Hat
Defenders are not aware of targets’ off limits,
Defenders are aware of the ground rules
Target and targets are chosen based on grudge or
pertaining to targets.
profit.

Responsibility Attacker takes responsibility for the Defender does not know who the attacker is,
to attack attack and the defender is aware of them. and may not be able to trace the attacker.

Known as unsung heroes - the attacker’s


Attacker only owns the system to use it for
intention is to own the system to detect
Intent economic, political, and ideological purposes,
vulnerabilities to protect an organization
i.e., for personal gain.
from being attacked by criminals.

5-Phase Hacking Methodology


As provided by Arora, S. (2018)

RECONNAISSANCE SCANNING GAINING


ACCESS

The hacker tries to gather a lot of Steps in detecting live hosts & The attacker gains access to
information about a system. services & uncovering vulnerabilities the systems and networks to
Processes: gathering information, in an organization’s network. control other systems related
determining an organization’s Types: port scanning, network to the organization.
network range, identifying an active scanning, vulnerability scanning.
machine, finding access points,
fingerprinting services.

COVER MAINTAINING
TRACKS ACCESS

To escape the security, commonly by The hacker will secure access to


clearing cache and closing open ports. the organization’s network.

REFERENCES
Arora, S. (2018, January 23). Webinar Wrap-up: The Five Phases of Ethical Hacking. Simplilearn.com. https://www.simplilearn.com/phases-
of-ethical-hacking-article
DianApps. (2019, October 18). Ethical Hacking and its Methodology. Medium. https://medium.com/@DianApps/ethical-hacking-and-its-
methodology-41468bc2ea67
Difference between Hackers and Crackers. (2020, May 17). GeeksforGeeks. https://www.geeksforgeeks.org/difference-between-hackers-
and-crackers/
What Is Penetration Testing? How Does It Work Step-by-Step? | HackerOne. www.hackerone.com. https://www.hackerone.com/knowledge-
center/what-penetration-testing-how-does-it-work-step-step
‭Name:‬‭Nurul Hanis binti Mohamad Zamri‬
‭Matric Number:‬‭S2116309‬
‭Course Code and Name:‬‭GFW0018 Security and Ethics in Cyberspace‬
‭Topic:‬‭Ethical vs Unethical Hacking‬

‭Brief written explanation of the design choices‬


‭The‬‭2-page‬‭poster‬‭highlights‬‭several‬‭important‬‭topics‬‭related‬‭to‬‭ethical‬‭and‬‭unethical‬‭hacking.‬
‭In‬ ‭the‬ ‭poster,‬ ‭there‬ ‭are‬ ‭mind‬ ‭maps,‬ ‭tabulations,‬ ‭and‬ ‭a‬ ‭variety‬ ‭of‬ ‭colours‬ ‭used‬ ‭to‬ ‭provide‬ ‭a‬
‭better‬‭understanding‬‭of‬‭the‬‭chosen‬‭topics.‬‭To‬‭start,‬‭(1)‬‭mind‬‭maps‬‭are‬‭used‬‭in‬‭the‬‭poster.‬‭For‬
‭instance,‬‭a‬‭tree‬‭map‬‭is‬‭used‬‭to‬‭describe‬‭the‬‭types‬‭of‬‭hackers‬‭that‬‭exist‬‭on‬‭Page‬‭1,‬‭and‬‭images‬
‭of‬ ‭hats‬ ‭in‬ ‭various‬ ‭colours‬ ‭depicting‬ ‭each‬ ‭type‬ ‭of‬ ‭hacker‬ ‭are‬ ‭used‬ ‭to‬ ‭initiate‬ ‭easy‬
‭understanding.‬ ‭A‬ ‭flow‬ ‭map‬ ‭is‬ ‭also‬ ‭used‬ ‭to‬ ‭visualise‬ ‭the‬ ‭5-phase‬ ‭hacking‬ ‭methodology‬ ‭on‬
‭Page 2 of the poster to have a clearer picture of how it works.‬

‭Furthermore,‬‭(2)‬‭tabulations‬‭are‬‭also‬‭used‬‭to‬‭make‬‭comparisons‬‭on‬‭several‬‭matters,‬‭such‬‭as‬
‭comparing‬‭black‬‭hat‬‭and‬‭white‬‭hat‬‭hackers‬‭as‬‭shown‬‭on‬‭Page‬‭2.‬‭Lastly,‬‭the‬‭poster‬‭is‬‭prepared‬
‭based‬ ‭on‬ ‭(3)‬ ‭subtle‬ ‭colour‬ ‭palette‬‭,‬ ‭featuring‬ ‭different‬ ‭shades‬ ‭of‬ ‭orange,‬ ‭blue,‬ ‭and‬ ‭grey‬ ‭to‬
‭have‬ ‭a‬ ‭subtle‬ ‭and‬ ‭clean‬ ‭presentation‬‭of‬‭the‬‭topic.‬‭To‬‭conclude,‬‭the‬‭design‬‭choices‬‭made‬‭are‬
‭based‬ ‭on‬ ‭the‬ ‭importance‬ ‭of‬ ‭the‬ ‭topic‬ ‭highlighted‬ ‭in‬ ‭the‬ ‭poster‬ ‭that‬ ‭can‬ ‭encourage‬ ‭easy‬
‭understanding,‬‭and‬‭also‬‭based‬‭on‬‭the‬‭idea‬‭of‬‭having‬‭a‬‭poster‬‭design‬‭that‬‭can‬‭cater‬‭to‬‭various‬
‭groups of people.‬

You might also like