27
MADE BY: SONAL (13itu042)

Hacking 1

Embed Size (px)

Citation preview

Page 1: Hacking 1

MADE BY: SONAL (13itu042)

Page 2: Hacking 1

CONTENTSWhat is hacking?Who is a hacker?Types of hackersFamous hackers in historyTypes of hackingTop 10 countries with most hackersAdvantages of hackingDisadvantages of hackingPreventive measuresWhat you can do after you are hackedHow to give password to an accountConclusion

Page 3: Hacking 1
Page 4: Hacking 1

WHAT IS HACKING?The process of attempting to gain unauthorized access to computer resources is called hacking.

Page 5: Hacking 1
Page 6: Hacking 1

WHO IS A HACKER? Hacker is someone who seeks or exploits

weakness in a computer system The term hacker is reclaimed by computer

programmers who argue that someone breaking into computers is better called a cracker.

Page 7: Hacking 1
Page 8: Hacking 1
Page 9: Hacking 1
Page 10: Hacking 1

TYPES OF HACKING Website Hacking Network Hacking Ethical Hacking Email Hacking Password Hacking Online Banking Hacking Computer Hacking

Page 11: Hacking 1

WEBSITE HACKINGHacking a website means taking a control from the website owner to a person who hacks the

website.

Page 12: Hacking 1

NETWORK HACKING

Network Hacking generally means gathering information about domain by using tools like

Telnets look UP,Ping,Tracert,Netstat etc. over the network.

Page 13: Hacking 1
Page 14: Hacking 1

ETHICAL HACKINGEthical Hacking is where a person

Hacks to find weakness in a system and then usually patches them.

Page 15: Hacking 1

EMAIL HACKINGCommercial and social websites rely on the security of email accounts . Large amount of email exchanges are occurring daily which

contain personal information as well as company secrets ,this makes email accounts

very valuable and becomes of the main causes for email hacking.

Page 16: Hacking 1

PASSWORD HACKINGIn computer security, password hacking is the process of recovering passwords from data that have been stored in or transmitted by a

computer system.

Page 17: Hacking 1

ONLINE BANKING HACKING

Unauthorized accessing bank accounts without knowing the password or without permission of account holder online bank

hacking.

Page 18: Hacking 1

COMPUTER HACKINGComputer hacking is when files on your computer are viewed , created or edited

without your authorization.Remote desktop connection technique.

Page 19: Hacking 1
Page 20: Hacking 1

ADVANTAGES OF HACKING

Can be used to recover lost information where the computer password has been lost.Teaches us that no technology is 100% secure.It helps the organization better protects its systems and information.Ethical hacking provides protection against theft.

Page 21: Hacking 1

DISADVANTAGES OF HACKINGCriminals can use it to their advantage.It can harm someone’s privacy.It is illegal.Hacking leads to financial losses.

Page 22: Hacking 1

PREVENTIVE MEASURESInstall a strong anti-virus.

Always run a anti-virus check before you download a program or a file from the internet.

Avoid disclosing personal details like phone number, credit card details to strangers.

Page 23: Hacking 1

What you can do after you are hackedShutdown the system or turn off the system.Separate the system from network.Restore the system with the backup or

reinstall all the programs.Connect the system to the network.It can be good to call the police or cyber

crime investigators.

Page 24: Hacking 1

HOW TO GIVE PASSWORD TO AN ACCOUNTUse unique password to your account.

Choose a combination of letters , numbers or symbols.

Always create a unique and long password for security of your personal informations and details.

Page 25: Hacking 1

CONCLUSION Hackers are just people with innovative

spirits and an in-dept knowledge of technology . Hackers are not necessarily

criminals , it totally depends on the way how you use your innovative idea . There is nothing wrong with hackers knowledge

Therefore do whatever you like as long as you didn't make other people suffered and

devastated by your own actions.

Page 26: Hacking 1
Page 27: Hacking 1