 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Part I: Making Good Online Choices
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Unit 18 Data Security 1.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Prepared by: Nahed Al-Salah
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Discovering Computers 2010
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Windows Tutorial 5 Protecting Your Computer
Chapter 40 Internet Security.
An Introduction to Phishing and Viruses
IT Security  .
The Impact Of ICT “Hacking”
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act of gaining unauthorized access to computer systems for the purpose of stealing and corrupting data.  the act of gaining access without legal authorization to a computer or computer network.  Hacking is unauthorized use of computer and network resources.  Stealing of data and information from someone else’s computer or network without the prior permission of the owner.  Definitions of hacking

 Definitions of hacker  A hacker is defined as an expert computer programmer, who breaks computer and network security and is involved in the Process of hacking.  Hackers And Crackers  Hackers are totally different from crackers.  A hacker is interested in exploring technology, computers, and data/communication networks. The opposite of a hacker is a cracker, whose interests in technology are for malicious or destructive aims.

 Hackers  Crackers  A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers.As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes.Hackers constantly seek further knowledge, freely share what they have discovered,and never intentionally damage data.  A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets.Crackers can easily beidentified because their actions are malicious

History of hacking The real meaning of hacking is to expand the capabilities of any electronic device. The first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. By the 1980's, phreaks started to migrate to computers.

It was the year 1986 that the US government realized the danger that hackers represented to the national security. During the 1990's, when the use of the internet widespread around the world, hackers multiplied. Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques.  History of hacking (Cont….)

 Types of hacking  So many types of Computer hacking are there, like……….. Password hacking hacking ( yahoo,g-mail,hotmail…….) Site hacking Credit card hacking Linux Hacking

Password Hacking A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. 1.The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party. 2.Another way of hacking passwords is through a hash function. There are many types of password hacking like…. passwording hacking Windows password hacking Bios password hacking

 hacking Yes, almost anything can be hacked in the Internet. There are several methods for hacking yahoo, msn accounts. 1.One of these methods is social engineering. 2.Hacking yahoo messenger or any other messenger is quite easy if you know the person’s ID.

Credit card hacking Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. Ways to hack the credit card. There are many ways to hack the credit card number. But the following two ways are oftenly used to hack the number. 1.Phishing 2.Through a website.

1. Phishing In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.

3.On line Shopping The third way is through the online process of buying. 2.Through website The hacker only needs to hack the systems of an online retailer, and search for the database where the retailer stores the information of all of the users who have made recent transactions.

Linux Hacking The main difference between Linux and Windows is that Linux is open source and windows are closed source. Well, that means that only Microsoft is authorized to change any part of the code of the Windows operating system. While in Linux, anyone can change it. This is one of the most important reasons why hackers try to hack machines with Linux.

 Examples  How to hack Yahoo Password? Step 1. Log in to your own yahoo account. Step 2. compose/write an or Step 3:In the subject line type exactly: password retrieve or " PASSWORD RECOVERY “ Step 4. On the first line of your mail write the address of the person you are hacking. Step 5. On the second line type in the address you are using. Step 6. On the third line type in the password to YOUR address (your OWN password)

Step 7. The final step before sending the mail is, type on the fourth line the following code exactly: “cgibin/$et76431&pwrsa” or “cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa script ” And the password will be sent to your inbox in a mail called "System Reg Message" from “System”.

 How to hack windows password? 1.Restart the computer and toggle the F5 button 2.You will get screen that will ask you if you want to boot with command prompt (that is one way) or boot in safe mode without command prompt 3.you will see a menu that asks which account you want to access. We know that the other accounts you can't get into but there will be a new account called computer administrator. 4.Click computer administrator and go to settings/control panel/user accounts 5.Remove password

Conclusion: