The document discusses various types of hacking, including white hat, black hat, and grey hat hacking, and their ethical implications. It highlights the techniques used by hackers to gain unauthorized access to systems, such as phishing, email hacking, and website hacking. Additionally, it emphasizes the importance of online ethics and protecting personal information in the digital age.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views13 pages
Cyber laws Assignment 2
The document discusses various types of hacking, including white hat, black hat, and grey hat hacking, and their ethical implications. It highlights the techniques used by hackers to gain unauthorized access to systems, such as phishing, email hacking, and website hacking. Additionally, it emphasizes the importance of online ethics and protecting personal information in the digital age.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
oc] : =~
31 Pes and procey 4 hacking?
dey do dhe piachce x” exploiting
in Compuler Ay8lem of networb
“a she — proces of fineling
hewsity Joop rol& Mm a
— fempule — sysiem =o nehwovh in oxcler
do gain ads yo personal oF
: dechnnigues include -
eg a aces Jo lata gre4 &
r a Type of Feching w?
7 Based on purpose > Bede on what
>unite hacking 16 being hathe d
7 Bhitl fat ing 7 falswosa haching \
? Grey hacking ? Email hacking
7 Comforer hacking
? vebbite faching
7 etwov — flaching
# white hat haehing:
née FecheeS are Wo
hnown oo
Cihicah hochey - white
Nab nacke lS
joy4 ae noche-
axe the good
world
Theke people vbe she Same
Yechnigue heel by he bao
Nor hoehexs - They Bo fleck ne
4ystem , but Jney con ony — flack
uhe System , bub thar shey
hove — fesrnsion J flack.ay
hochers ; Guy “hat — hachey — ove
uhe hybovd beween dhe Black
i ancl white hat Racker They
Foch — any — dystem = even if they
—dov't have —petmidion to Jebr he
Secor ty 4 une Sydhem but they
wilh never droll money ox dornage
e System
~ fiat - hackers: Bloch her frachey ase
f Fh c& an unethical — hacker
Qa Aecovity csacher. {hese peopte
une — dydrem iMegokly Jo teal
os «6d achieve uhe's oun idbegel
Clovis headed on what 1's
hacked:
echoing
faching|
# swelvot® hacking’ eloovh facking eeané or
f 9
Garneving in fotmah oO abort a
with the — intenb Yo. hax
une networh dysrem anal
Nehwoth
homper uth
ofebations §— vbing the variuk Jools the
Tenet» ne Lookup » fing ere:
# website
hacking? website hacking méand
Unauthorized acces
4emver , dlalabse — andl
| Yalaing over a web
Mohe Q chonge
m vhe infosmation
+ Comporey Mocking : 9+
bos hee unawtey zed
&(eu Yo the Computer Gnd £ +e
vhe Information rom fe WMbe
Computex tol and fal words:
H Pats word Faching? Palbwouel
uhe procels af
faldworsd from
hacking Js
Aecovering
dakn hat
been —alrdtady lowed
decret
hed
M Com peters.
# Email hocking: foraip hacking
mean&
CMO UKoss dl cageye
account —_ anol vbing
uhe Owner’ s
an email
ub wi hoot
PeEmikbion
ne‘tio cael Gelen hy
ia vs being
mited by 2 hue number row a
ie aie heft happen when dome
Alecls yoo petsonal information
Sait fravdl - ahi the IS
yn meny ways by gathering
infotmehon — fuch_—c8-_— tend achon
Jorrnckon eh another person do
___ttarsacnong.
Iden hy ther. this ds a
i,
m wnich une urchm
Chiminol oy whe theif
: nis position with dhe
une victim such
olocumenb arymos sf Sdenthy nef:
tity — Jhieves vlally feck — into CoSfokate
dala de for Pergonol — xeon Had hich
Aequites fort = bub with euevan
Seciol ~ ogi neering Jechn'gu es.
4 Pie tect cabling: Theives faele nding do be
an employ ce os a
Company aves”
Phone hing for —_ finoncrel informehon
xe an —exomPfe J ns Mee
# rai? Ande nis ig ag Fechnigue in
which sexed, corel information — with
Uxorsachonal don M extracted! fom
She — Poblic mail boxe -
hing: Thi’ 6 0 dechnigue — in which
Crnoil feticining vo be — from
‘ senb Jo Q vichm with
BE
mer 38 widely used by the
are aware y
making users gek
nehwor A.fot decieny
Recogniging thot he inlevesr iS an extension
of Society the jnievnel js mb A New
wold ™m — which any thing goes bub
hathey a nad olimension of wne wostol
Akoond vb
Acknowledging poltotah — oli fprenced: &ven when
naltonal —hovnclaxies no forges apphy-
Colleol hes Peck ara Jofexonte Should
hemain unig Aeguires finding a wy
yo ocept snot he focto® —vobvés
ano norms gome nelkgens, wild
wb be whe Sociel uclue
fos dosines for componieé » beng 4
Good cin3en applying online ethic8,
aon ving nehquette. Include «
17 Respecting NgRS Plivary fox offtine
Emptogtess SrfotmeHion pouessed — by
Cif zevs in Shere offline
sure rachons3
Y Moindcining — danspasency in Infodmnation etic
By vahing acho 40 Ha lonhu mesg
fon tosily anol quic bly ond eSiand yo.)
Whot Company Jf using hers thformetion
arol prottehng Them from haxm , Confonies
fon pkoulde bee wilh a
ca ewer snip
Some thick and Chiqueties % cybeer weno
Fo mahe gat popte
di yahing
ConvélSahion
Hecy mere
& Priority: Notning dé more
UNor Hying Yo \ave a
IM someone
A heir Phone, dablep
ecHonic deuce.
YE hex fect}ur
Who yh Cng rotec)
°F — anothey-
‘enguage: Name - eliing ,
Cording, — expyeryi Ing ,
offen dive opinion 4
dhs Jere
might Conceively
deli heated
if J woord vit ao
face “4 ong one om
bee
‘Phat You iatite,
do nor write St.&/ Shade with Didckehion: pon! pos+ daunh
Picwres, dog uke Picloses or
omer Alalemen’ — aboot your private Ne
onfing - one hee Imoge and diakement
Gnd opfoacled Ub the inernet , they
axe uhere fos ne Rebs J Ane worl!
do see.
¥ Dorlt exatole omers: when 9) feels Ife
gov ‘Ae being Le#/F ovb » 9b con flag
Yo both negohve motions and a sense
q fobt orhol.
* choose friends widely: J can he isalting
yo be alto peal fiom dome’Gne
Socio —medlig friend HSE - ho, think
before sendin g %& friend Aeuest
or accepaing Qn mui fahon.