PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD 2010404846 NUR’ ARINA ATIQAH BT ASRAR 2010438934.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Terms 12 Definitions and Questions. Hacker Hacker is a term used to describe different types of computer experts. The meaning of the term, when used in.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
Computer Security and Penetration Testing
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
The Uses of White Hat Hacking Tyler Schumacher
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Hacking And Cracking ICT Project.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Lecture 17 Introduction to Hacking. WHAT IS NETWORK SECURITY? Security is much larger than just packets, firewalls, and hackers. Security includes: –
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Hacking Cybercrime (1).
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
IS Network and Telecommunications Risks Chapter Six.
Aksana Chornenkaya, Sherin Hassan, & Meagan Moore.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Hacking by Tiffany Duff Computing in the Modern World Ms. Stewart.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Jeopardy Grammar Fix the Mistakes True or False Vocabulary 1 Vocabulary 2 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
CONTROLLING INFORMATION SYSTEMS
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Security Debate Why cracking should be criminalized.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Logan Wojcik COSC 101. Overview ~ Both are hackers ~White hats help computer systems become more secure ~Black hats attack and exploit breaches in systems.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
What Is Vulnerability Assessment? Chapter 23. vulnerability In computer security, the term vulnerability is applied to a weakness in a system that allows.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
8 – Disaster and Malicious Attack Planning and Recovery
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by: Kevin Regaldo Phillip Dai
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Secure Software Confidentiality Integrity Data Security Authentication
Hackers and Crackers iJacsn.
The Impact Of ICT “Hacking”
Ethical hacking
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Security in Networking
Topic 5: Communication and the Internet
Prepared By : Binay Tiwari
Regulating Online Speech
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR

Hacker  A person who maliciously cracks software and or passwords. Hacking  means finding out weaknesses in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks. Cracker  someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security

 White hat  A white hat cracker breaks security for non-malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration test and vulnerability assessment within a contractual agreement.  Black hat  A Black Hat Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"(Moore,2005). Black Hat Hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network

Techniques  Vulnerability scanner  Password cracking  Packet sniffer  Phishing  Rootkit