The Impact Of ICT “Hacking”

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Security and Penetration Testing
Prepared by: Nahed Al-Salah
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
Computer Hacking Cybercrime (1).
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Unit 19 INTERNET SECURITY
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT security By Tilly Gerlack.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
According to netiquette simply refers to our behavior the internet.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Any criminal action perpetrated primarily through the use of a computer.
Computer and Network Security Brendan Duncombe Bahein Maung.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Computer Hacking By: Ethan Wolfe. What is Computer Hacking? Computer Hacking- The practice of modifying computer hardware and software to accomplish a.
Technical Implementation: Security Risks
Seminar On Ethical Hacking Submitted To: Submitted By:
An Introduction to Phishing and Viruses
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
MALWARE Autumn Mattis.
IT Security  .
Homeland Security: Computer Protection
Hackers and Crackers iJacsn.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Ethical hacking
Computer Security Elaine Munn Introduction to Computer Security.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Malware, Phishing and Network Policies
Prepared By : Binay Tiwari
HOW DO I KEEP MY COMPUTER SAFE?
Introduction to Cybercrime and Security
Computer Security.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Presentation transcript:

The Impact Of ICT “Hacking” Prepared By : Name : Mohammad Sahrizan Bin Saldikun Class:4 c Teacher Name: Ismail Bin Hj Jaani

Content Solution Introduction Content Source Definition Black Hat Hacker White Hat Hacker Grey Hat Hacker Elite Hat Hacker Content Overcome Hacking Through… Solution Bibliography Source

Definition During the 1990’s,the term hacking originally denoted a skilled programmer proficient in machine code and operating a system. Hacking basically who wants to break into computer network and software. The hacker subcultures has develop among these new-age.

Type Of Hacker / At any Rates, Here Are The Type Of Hacker. White Hat Black Hat Grey Hat

White Hat Hacker Someone who has non malicious intent whenever he break into security system , In fact , a large number of White Hacker are security expert themselves who wants to push the boundries.

Black Hat Hacker They were also known as cracker . The type of hacker that has malicious intent , with use of technology such as a networks , phone system or computer software without authorization. his can malevolent purposes from all sort cybercrime , piracy , identity theft , credit card fraud and may deploying worms and malicious sites to meet his end.

Grey Hat Hacker The type of hacker who exhibits traits from both white hat and black hat. More to the point this is the kind of hacker that isn’t a penetration tester but will go ahead and surf the internet for vulnerable he could exploit. he’ll hack any site freely and without any prompting or authorization.

Conclusion Hacking can be known as a person that can be accessing without permission to computer system by a person called the ‘Hacker’.

Overcome Hacking Through … Thing to do is keep your password a secret You need to make sure your computer doesn’t have viruses , trojans , keyloggers , etc. Keep your scripts and download program updates Doesn’t have a writable file permissions Never leave scripts on your account that are not being used.

Bibliography http://www.google.com http://www.wikipedia.com http://www.secpoint.com/types-of-hacker.html