Page 132 - 2611_SmartGPT Pro V(5.0) C-8
P. 132
HACKING
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
1
0
0
1
0
0
0
0
1
1
1
1
0
1
1
0
1
1
0
0
1
0
0
1
0
0
0
0
1
1
1
1
1
1
1
0
1
0
1
0
0
1
1
0
0
0
1
0
1
0
1
1
0
1
0
0
0
1
0
1
1
1
1
1
1
1
0
0
1
0
0
1
0
1
0
1
1
0
0
1
1
Hacking is when someone tries to access a computer, 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
1
0
1
1
0
1
0
0
1
0 11
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
100101
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0
network or online account by bypassing security 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 10 111
0010
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
1
010
101
1
111
1
11
00
11
010
1
00
11
0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 1 10 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
10
10
0 PASSWORD
LOGIN
1 111000101010 10 100101 0101 01 1 0 1 0 1 0 0 1 1 0 1 1 0 0 1 0 1 0 1 0 111 11 1 000 00 0 1 1 1 0 1 1 0 00 0 0 0 1 1 1 1 1 1 1 1 0
1
0
1
1010 1001101100 10 101010 1010
1
00
1
0
0
1
1
0
0
0 00 11 11 11 11 0
1
0
1
1
1
1
1
11
00
010
measures. Sometimes hacking is done to identify and 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 001 010 10 111 11 1 0 0 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
10
111
00
100101
0
0110
0101
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
10
00111
01
00
0
0
1
0
0
1
0
1
0
0
1
1
1
0
0
0
1
1
0
0
0
0
1
1
1
0
0
0
0
1
0
1
1
1
1
1
1
0
0
1
0
0
0
1
1
1
1
1
1
1
1
1
1
1
0
1
0
1
1
1
1
1
0
1
0
1
0
1
0
0
0
0
1
0
1
1
1
0
10
1
1
1
1
0
0
0
11
1
0
0
1
1
0
1
010
0
0
0
0
0
1
1
0
0
01
0
1 1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0 0
0
0
1
0
0
1
1
1
0
11
0
0
0
1
110
1
fix security problems; this is called ethical hacking. 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0
0
1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 1 1010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0
1
1
0
0
0
0
1
1
1
1
0
1
1
1
1
0
0
1
1
1
0
0
0
0
0
1
1
1
1
1
0
0
1
1
0
1
0
1
0
1
1
1
0
0
0
1
0
1
1
1
0
0
1
0
1
0
1
1
1
1
0
0
1
0
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0
1
1
0
0
0
1
0
0
0
0
1
1
0
1
0
1
1
0
1
1
0
0
1
0
1
1
0
1
1
0
0
0
1
0
1
1
1
1
1
0
1
0
1
0
1
1
0
0
1
0
1
0
1
1
1
1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 1 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0
1
1
0
0
1
1
1
1
1
0
1
0
1
0
0
1
1
1
1
1
0
1
0
Other times, it is used to steal data or cause harm, 1110001010100 10 100101 0101 01010 100110110 1 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
1
0
1
1
0
1
1
1
1
1
0
0
1
1
1
1
0
1
0
1
1
0
1
0
0
1
1
1
0
1
1
1
0
1
1
0
0
0
0
0
0
0
1
1
1
1
0
0
0
1
1
1
1
0
0
0
0
0
1
1
1
1
0
0
0
0
0
0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 01010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
which is illegal. 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
1
1
1
0
1
1
1
1
0
0
0
0
1
1
1
1
1
1
0
1
0
0
0
1
0
1
0
0
0
1
0
1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0
1
0
1
0
1
1
0
1
0
1
0
0
0
1
0 010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
0
0
1
1
0
1
1
1
0
0
1
0
1
0
1
1
0
0
1
0
0 0 00 00 11 11 11 11 0
1
1
1
0
0
1
1
1
0
1
1
1
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
As a digital citizen, always act responsibly, respect 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
CONFIDENTIAL
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
0000000 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0 00 00 0 000 00
1110001010100 0 1 1 0 010 0 1 10 0 1 11 1 1 1 1 11 1 1 1 0 00 0 0 00 0 0 1 1 1 1 1 0 0 0 1 000 000 0 000 00 1 0 1 0 1 0 1 0 00 00 0 1 0 1 1 1 0 1 1 1 0 0 00000 1 1 1 0 1 1 0 0 0
0
0
0
0
1
00
0
00
0
0
0
1
0
1
0
1 101010 1010 101 010 10 111 11 1 00 00 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
0
1
1
1
1
0
1
0
0
1
0
1
1
1
1
0
0
0
1
0
1
1
11
1
11
1
1
1
11
1
privacy, follow rules and keep your information secure.
TYPES OF HACKING
Hacking can be done in different ways depending on the hacker’s purpose and methods.
Understanding these types helps you learn how hacking affects online safety and security.
Black-hat Hacking (Malicious Hacking)
Black-hat hackers break into computer systems or networks without permission
for harmful or illegal purposes, such as to steal data, money or damage
websites and systems. For example, a hacker stealing credit card information
from an online store.
PURE
The Dark Web hosts 70% of illegal activities linked to black-hat hacking. FACT
White-hat Hacking (Ethical Hacking)
White-hat hackers are ethical hackers who are hired
by organisations to test the security of their systems and
identify weaknesses to improve security and help
prevent cyberattacks. For example, a hacker may be hired
by a company to find bugs in its software before they
can be exploited by criminals.
Grey-hat Hacking
Grey-hat hackers break into systems without permission, but without
harmful intentions. They often reveal security flaws to owners even though
they don’t have permission to hack the site. For example, a hacker finds a
flaw in a website and tells the owner about it, but doesn’t have permission to
hack the site.
130 Computer Science (V5.0)-VIII

