HACKING. Contents (1)  VARIOUS DEFINITIONS OF HACKING.  Who is hacker? (various definitions).  What does he do?.  Why does he do?  Who is a cracker?

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

UNIT 20 The ex-hacker.
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
What is hacking? Taeho Oh
Prepared by: Nahed Al-Salah
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Ethical Hacking by Shivam.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Hackers. What Is A Hacker? - A hacker is someone who uses a computer to gain unauthorized access to data - Hackers are most commonly associated with malicious.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Troubleshooting Windows Vista Security Chapter 4.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer security By Shreya Houji. VirusesViruses.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Ethics. Ethics are the principles and standards we use to decide how to act.
INTERNET: The Good, The Bad and The Ugly
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
CSCI-235 Micro-Computers in Science Privacy & Security.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
PRESENTED BY : Bhupendra Singh
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
3.6 Fundamentals of cyber security
HACKING.
Malware, Phishing and Network Policies
Faculty of Science IT Department By Raz Dara MA.
Test 3 review FTP & Cybersecurity
Presentation transcript:

HACKING

Contents (1)  VARIOUS DEFINITIONS OF HACKING.  Who is hacker? (various definitions).  What does he do?.  Why does he do?  Who is a cracker?  Cracker v /s Hacker.

Contents (2)  Hactivism.  History of hacking.  Who can be a real hacker?  Forms & types of hacking.  Procedure for hacking a password & in general  Threats caused by hacking.  Why can ’ t defend against hackers?  How to translate hackers language.  What should be done after hacked?  Preventive measures for hacking ??

VARIOUS DEFINITIONS  Hacking is a technique to get access on other computers without its permission or we can say that without using the ways which are available and developing the own ways of doing it.  Hacking is a way of breaking the code.  Hacking is a code or a program often written to breach the security of other systems.  To gain access to a computer illegally.  hacking is a cyberwar.

HACKER

Who is hacker? (1)  Is who practices hacking.  Or a person who enjoys learning the details of the computer and how to stretch their capabilities-as opposed to the most users of the computers who prefer to only to the minimum amount necessary.  Or a person who has harmful behaviour and wicked intention.  Or has iilegal access to the computers. Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.

Why do hackers hack?  Just for fun.  Show off.  Hack other systems secretly.  Steal important information.  Destroys the enemy or the target computers network security.

The ways in which they hack  NetBIOS  ICMP Ping  FTP  HTTP

Who is a cracker?  Crackers are bad guys who break into the system.  They do the hack the information but for a different purpose.Crackers and hackers are different.  They do malpractices such as steal money from banks,atms etc.

Cracker v /s Hacker. HACKERS:  Are good guys who create elegant solutions to problems.  Expose security flaws.  Build secure systems. CRACKERS:  Are malicious and cause harmful damage.  Make or steal money.  Utilize downloaded exploitations.

HACTIVISM  That is the use of hacking to promote an agenda.  Politically (ex:defacing a campaign website).  religious (ex:hacking an abortion info website).  Military (adding misinformation to the enemy sites)

History of hacking :  Good hack especially clever program code :  “breaking in”to computers became very easy 1990-PRESENT:  www developed&internet grow exponentially.  Information theft/disabling/hijacking began.  Hacking can be writing a program for enjoyment.  Hacking can also done to perform reverse engineering of software where source code is lost.

REAL HACKERS OR SKILLS OF A HACKER:-  Who study c/c++ and the assembly languages.  Study computer architecture perfectly.  Study operating systems.  Study computer networks.

FORMS OF HACKING  It can be hacking a secure information from a computer illegally.  Hacking an or a password.  Hacking a website.  Hacking in otherwords can be a way getting a password which is lost by using a program.

Types of hacking Normal data transfer InterruptionInterception ModificationFabrication

Procedure for hacking a password & in general 1.Download it from required software. 2. Install its setup to public libraries, cyber cafes, your friend computer or your office computer. 3. Hide it after mentioning your id into this software. 4. Check your , you start getting user name and password of everybody who use that computer. And their is very basic thing about user name and password. People often have same password for all the services they used.

In general what a hacker does to escape  Take all safety Measures to hide yourself from target. There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can. Few important tricks :-  Use Hide Ip Software :- This software will help you to hide your IP address.Hide Ip IP address  Use Firewall :- Firewall secure your computer as well as restrict any personal information from going outside.Firewall  Use Proxy servers :- Whenever you want to surf the computer of your target use proxy servers.Proxy servers  Use others username and password: - Try to avoid using your own user name and password for internet connection. Learn the technique to get other's user name and password.Learn the technique

Why can ’ t defend against hackers?  There are many unknown security hole  Hackers need to know only one security hole to hack the system  Admin need to know all security holes to defend the system

Is hacking always bad?  some (usually young) hackers do it for “fun”  No it is not always bad, hacking sometimes may be the cracking the code of the program where the source code is lost.  Its just mingling away with the hardware to make things work.

How to translate the hackers ’ language (1) 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x

`  Ex) –1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n

What should be done after hacked?  Shutdown the system –Or turn off the system  Separate the system from network  Restore the system with the backup –Or reinstall all programs  Connect the system to the network  It can be good to call the police

Why hackers succeed?  Problems are often fixed only after exploited.  Many companies hire hackers.its a big business for many consultants and many believe in “security in secrecy” and hackers & crackers enjoy this challenge.

Role of government/forensics  Search, Seizure, and Analysis of Computers:  currently, the government can seize any computer... if there is “sufficient” evidence of criminal use.  equipment can be seized indefinitely. computer forensics are needed to analyze seizures:  hard drives (deleted files)  cracking encryption keys  internal “wear and tear” indicating usage patterns  requires significant training/research

Preventive measures for hacking  The most popular method of protection against hacking home systems is to have an antivirus soft ware.  Firewalls act as a deterrent to hacking by protecting private networks from public.  Have the system backup.

References :

CONCLUSION  Always hacking need not be breaking in to the computers, it can be used for a good purpose and be a hacker instead of cracker.

THANK YOU