0% found this document useful (0 votes)
10 views11 pages

PP2 English

The document discusses the multifaceted nature of hackers, categorizing them into white hat, black hat, grey hat, and hacktivists, each with distinct motivations and impacts. It highlights both the positive contributions of ethical hackers to cybersecurity and innovation, as well as the negative consequences of cybercrime, including data breaches and economic damage. The document concludes by emphasizing that hackers' effects depend on their intentions and actions, advocating for protective measures against hacking.

Uploaded by

Paulo PG
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views11 pages

PP2 English

The document discusses the multifaceted nature of hackers, categorizing them into white hat, black hat, grey hat, and hacktivists, each with distinct motivations and impacts. It highlights both the positive contributions of ethical hackers to cybersecurity and innovation, as well as the negative consequences of cybercrime, including data breaches and economic damage. The document concludes by emphasizing that hackers' effects depend on their intentions and actions, advocating for protective measures against hacking.

Uploaded by

Paulo PG
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

REPUBLIC OF ANGOLA

MINISTRY OF EDUCATION

HIGHER POLYTECHNIC INSTITUTE OF TECHNOLOGIES AND


SCIENCES

COMPUTER ENGINEERING

SECOND PARTIAL ENGLISH TEST

HACKERS: GUARDIANS, VANDALS, AND INNOVATORS

LUANDA, 2024/2025
GROUP MEMBERS

1º Roger Sobral
2º Tchanek Santos
3º Paulo Gaspa
4º Ricardo Nanga

Course: Computer Engineering


Year: 1º
Class: T1
Room: A4
Group nº 10
TABLE OF CONTENTS

INTRODUCTION.........................................................................................5
HISTORICAL CONTEXT...........................................................................5
TYPES OF HACKERS.................................................................................6
MOTIVATIONS BEHIND HACKING........................................................7
FAMOUS HACKER STORIES....................................................................8
Kevin Mitnick – The Most Wanted Hacker..........................................8
Anonymous – The Hacktivist Collective................................................8
Stuxnet – The Cyber Weapon Against Iran..........................................8
THE POSITIVE IMPACT OF HACKERS.................................................9
THE NEGATIVE IMPACT OF HACKERS.............................................10
HOW TO PROTECT AGAINST HACKERS...........................................11
CONCLUSION...........................................................................................12
INTRODUCTION

Hackers are individuals highly skilled in computer systems, networks, and


programming, who explore, modify, or sometimes exploit vulnerabilities in
these systems. They have a deep understanding of how technologies work
and are capable of manipulating or bypassing security mechanisms in
software and platforms to achieve various goals.

HISTORICAL CONTEXT

The term "hacker" originated in the 1960s at the Massachusetts Institute of


Technology (MIT), where it initially referred to clever, innovative tech
enthusiasts who enjoyed exploring and experimenting with computer
systems. These early hackers were often students and programmers who
pushed the boundaries of technology, finding creative solutions to
problems and improving the functionality of systems. The word was
associated with curiosity and skill, rather than any harmful intent.

However, over time, the meaning of "hacker" expanded and evolved. As


computer technology became more widely accessible and the internet grew,
the term began to take on a more negative connotation. With the rise of
cybercrime and unauthorized access to systems, hacking became associated
with illegal activities, such as data theft, fraud, and malicious attacks on
networks.

TYPES OF HACKERS

White Hat Hackers: these hackers use their skills to identify


vulnerabilities in systems, networks, and applications, and report them to
organizations for fixing. They may also help design secure systems. White
hat hackers often work as cybersecurity professionals or consultants.
Examples: Penetration testers, cybersecurity consultants.

Black Hat Hackers: these hackers engage in illegal activities, such as


accessing sensitive information, stealing financial data, or deploying
malware. Their goal is usually financial gain, disruption, or
theft.Examples: Cybercriminals, ransomware operators.

Grey Hat Hackers: these hackers may exploit vulnerabilities in systems


without authorization, but instead of causing harm, they might report the
issue to the affected organization or make it public. Their actions often fall
into a legal gray area.

Hacktivists: these hackers use their skills to promote political or


ideological agendas. They may target government websites, corporations,
or other institutions to raise awareness about issues or disrupt operations as
a form of protest.
Examples: Anonymous, LulzSec.
MOTIVATIONS BEHIND HACKING

Financial Gain: One of the most common motivations for hackers is


financial profit. This can come from stealing sensitive data, committing
fraud, engaging in identity theft, or deploying ransomware.

Curiosity: Many hackers start out driven purely by curiosity and the desire
to learn. They seek to develop their skills by experimenting with different
tools, coding techniques, and hacking methods. The motivation is largely
about gaining knowledge and improving technical proficiency rather than
achieving any specific outcome.

Activism: Hackers motivated by political or social causes, often referred to


as hacktivists, use their skills to promote or protest issues. Their activities
may involve attacking government sites, corporations, or institutions they
perceive as unethical or corrupt.

Revenge: Some hackers engage in attacks out of personal grudges,


resentment, or revenge. This could involve targeting former employers,
colleagues, or individuals who have wronged them.

Challenge: For some hackers, the motivation is not personal gain or harm
but rather the intellectual challenge and the thrill of solving problems. They
may hack for the fun of it, to test their skills, or simply to see if they can
break into a system.
FAMOUS HACKER STORIES

Kevin Mitnick – The Most Wanted Hacker

Kevin Mitnick was one of the most famous hackers in the 1990s. He
gained international attention for his unauthorized access to
numerous computer systems, including those of major corporations
like IBM, Nokia, and Motorola. Mitnick’s hacking activities were
primarily driven by the desire to understand how systems worked
and to outwit security measures.

Anonymous – The Hacktivist Collective

Anonymous is a decentralized group of hackers and activists that


gained global recognition for its high-profile cyberattacks against
governments, corporations, and other institutions. The group uses
hacking as a form of protest, typically in support of free speech, anti-
censorship, and anti-government causes.
Stuxnet – The Cyber Weapon Against Iran

Stuxnet was a highly sophisticated cyberattack discovered in 2010,


designed to sabotage Iran’s nuclear enrichment facility at Natanz. It
targeted the Siemens PLCs (Programmable Logic Controllers)
controlling the centrifuges used to enrich uranium.

THE POSITIVE IMPACT OF HACKERS

Cybersecurity Advancement: Ethical hackers play a pivotal role in


advancing cybersecurity by identifying and mitigating security threats
before they can be exploited by malicious actors. Their work enhances the
overall resilience of systems, networks, and applications.

Vulnerability Disclosure: A key aspect of ethical hacking is vulnerability


disclosure the process of responsibly reporting discovered security flaws to
the relevant parties (such as software developers or companies) so they can
be patched.

Innovation: Hackers are often at the forefront of technological innovation.


Their deep understanding of systems and their ability to think creatively
lead to improvements in technology, software, and cybersecurity methods.
THE NEGATIVE IMPACT OF HACKERS

Data Breaches: One of the most damaging consequences of hacking is


data breaches, where unauthorized access to sensitive or personal
information occurs. Hackers often target systems for the purpose of stealing
data, which can be sold, used for identity theft, or exposed publicly.

Economic Damage: Hackers can inflict significant economic damage on


businesses, governments, and entire industries. Cyberattacks often have far-
reaching financial consequences that go beyond the immediate costs of
remediation.

National Security Threats: Hackers also represent a significant threat to


national security, as cyberattacks can target critical infrastructure,
government operations, military systems, and other vital state functions.
These threats can destabilize nations, interfere with political processes, and
compromise sensitive data.
Reputation Harm: Reputation harm is one of the most significant but
often overlooked consequences of hacking. Both individuals and
organizations can experience long-term damage to their credibility and
public trust as a result of cyberattacks.

HOW TO PROTECT AGAINST HACKERS

1. Use Strong Passwords and Two-Factor Authentication (2FA): Create


complex, unique passwords for each account and consider using a
password manager. Enable two-factor authentication (2FA) to add an
extra layer of security, ensuring that even if a password is compromised, an
additional verification step is required.
2. Keep Software and Systems Up-to-Date: Always update your
operating system and applications with the latest security patches. Enabling
automatic updates ensures that critical vulnerabilities are fixed as soon as
patches are available.
3. Implement Network Security Measures: Use firewalls to filter
unauthorized traffic and a VPN to encrypt online activity. For businesses,
consider segmenting networks to reduce the risk of widespread
compromise.
4. Beware of Phishing Attacks: Be cautious of unsolicited emails or
messages that ask for personal information or direct you to suspicious
websites. Always verify the source before clicking links or downloading
attachments.
5. Encrypt Sensitive Data: Encrypt sensitive information both in transit
and at rest to prevent unauthorized access. Use end-to-end encryption for
communications to protect your privacy.
6. Regular Backups: Back up important files regularly, either to external
drives or cloud services. This ensures that if data is lost or compromised,
you can restore it without significant loss.
7. Educate and Train Employees :Regularly train employees on
cybersecurity best practices, such as recognizing phishing attempts.
Simulated security exercises can help reinforce safe habits.

CONCLUSION

Hackers, in themselves, are neither inherently good nor bad. Their impact
on the digital world largely depends on their intent and how they choose to
use their skills. While some hackers, known as white-hat hackers, use
their knowledge to identify vulnerabilities and strengthen systems, others,
often referred to as black-hat hackers, exploit these same vulnerabilities
for malicious purposes. There is also a middle ground, with gray-hat
hackers who may explore systems without permission, sometimes
reporting vulnerabilities, but without clear malicious intent.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy