PP2 English
PP2 English
MINISTRY OF EDUCATION
COMPUTER ENGINEERING
LUANDA, 2024/2025
GROUP MEMBERS
1º Roger Sobral
2º Tchanek Santos
3º Paulo Gaspa
4º Ricardo Nanga
INTRODUCTION.........................................................................................5
HISTORICAL CONTEXT...........................................................................5
TYPES OF HACKERS.................................................................................6
MOTIVATIONS BEHIND HACKING........................................................7
FAMOUS HACKER STORIES....................................................................8
Kevin Mitnick – The Most Wanted Hacker..........................................8
Anonymous – The Hacktivist Collective................................................8
Stuxnet – The Cyber Weapon Against Iran..........................................8
THE POSITIVE IMPACT OF HACKERS.................................................9
THE NEGATIVE IMPACT OF HACKERS.............................................10
HOW TO PROTECT AGAINST HACKERS...........................................11
CONCLUSION...........................................................................................12
INTRODUCTION
HISTORICAL CONTEXT
TYPES OF HACKERS
Curiosity: Many hackers start out driven purely by curiosity and the desire
to learn. They seek to develop their skills by experimenting with different
tools, coding techniques, and hacking methods. The motivation is largely
about gaining knowledge and improving technical proficiency rather than
achieving any specific outcome.
Challenge: For some hackers, the motivation is not personal gain or harm
but rather the intellectual challenge and the thrill of solving problems. They
may hack for the fun of it, to test their skills, or simply to see if they can
break into a system.
FAMOUS HACKER STORIES
Kevin Mitnick was one of the most famous hackers in the 1990s. He
gained international attention for his unauthorized access to
numerous computer systems, including those of major corporations
like IBM, Nokia, and Motorola. Mitnick’s hacking activities were
primarily driven by the desire to understand how systems worked
and to outwit security measures.
CONCLUSION
Hackers, in themselves, are neither inherently good nor bad. Their impact
on the digital world largely depends on their intent and how they choose to
use their skills. While some hackers, known as white-hat hackers, use
their knowledge to identify vulnerabilities and strengthen systems, others,
often referred to as black-hat hackers, exploit these same vulnerabilities
for malicious purposes. There is also a middle ground, with gray-hat
hackers who may explore systems without permission, sometimes
reporting vulnerabilities, but without clear malicious intent.