Learning Activity 1: Hackers and Hacking Process

  • List the three classes of hackers.

  • Describe the methodology employed during the hacking process.

  • Propose a tool used to find vulnerabilities in web applications.

  • Which type of hacker hacks government agencies to obtain confidential information?

  • Explain the security vulnerabilities which a hacker can exploit from an operating system?

Work out the above in a word document and upload on the platform.