What is computer hacking?

Slides:



Advertisements
Similar presentations
How to install “bubble” fonts These fonts are used to create the Formative Assessment sheets.
Advertisements

Ebinport Students Encourage Internet Safety. “Doing the Right thing online.” January 2012.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Hacking And Cracking ICT Project.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Section 6 Theory Software Copyright, Viruses and Hacking.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Your Guides Sally and Benny. So Sally what is a Virus all I know is that it is a program, right? Your right Benny, but a Virus is an destructive program.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
Hackers And Hacking.
Advantages of Using a Network By Ryan Riddell. Shared Files The same files can be accessed from different computers on the network Files can be traded,
War Dialing By : Lindsay Myers Daniel Adame. What is it? People dial a lot of people phone numbers at once to see if the line is busy and if it is then.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Choose a category. You will be given the answer. You must give the correct question. Click to begin.
Jeopardy Grammar Fix the Mistakes True or False Vocabulary 1 Vocabulary 2 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
By :Mitchell Christie by :Mitchell Christie safety.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Would you weigh less in an elevator? Discuss as a group, then watch the video.
“2 million Facebook, Gmail and Twitter passwords stolen in massive hack”
A firm that had its secure system hacked could have the right to investigate the person who sent s into the hacked system, the sender’s ISP.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
 Being free from public attention that means not being watched or disturbed by other people.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
1.What country has the largest column? What are the reasons that you think that this country has the highest amount? The USA has the largest column.
Here // This is the presentation about to describe categories of Hackers. //In this session you will learn aims, identity and purposes of hackers >>> Enter.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Time Value of Money Annuity.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
To Know what Cyber crime is
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Cyber Security Awareness Workshop
How to build a good reputation online
Technology in the past 50 years
Hackers and Crackers iJacsn.
The Boss asked him, “So, what makes you suitable for this job”?
The Impact Of ICT “Hacking”
Cyber Security Experts
Introduction to computer networks
Malware March 26, 2018.
Data Protection Act and Computer Misuse Act ANSWERS.
Penetration Testing Computer Science and Software Engineering
Learning Target: I can add and subtract numbers in many ways.
Creating a Budget.
Identity Theft By: Wilson.
Cybersecurity Simplified: Ransomware
Presentation transcript:

What is computer hacking?

Instructions: Watch the video and answer the questions as you go along. Email this file to Mr. Vela

1. What did the guy who hacked myspace do to people’s myspace accounts

2. What were the consequences for this person? (5:15)

3. A big company will pay a lot of money called a “bug bounty” to whom A person that has hacked their computer systems. A person that finds and arrests a hacker who has destroyed a company’s systems. A person that helps the company by looking for problems in their computer systems and fixing them. A person that break internet laws.

4. Describe what ransomware does to your computer: (9:08)

5. What do hackers ask for when they infect another person’s computer with ransomware? (9:25)

6. What is the difference between a “white hat” hacker and a “black hat” hacker? Give one example.