Presentation is loading. Please wait.

Presentation is loading. Please wait.

Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.

Similar presentations


Presentation on theme: "Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations."— Presentation transcript:

1

2

3

4 Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations and how to increase capabilities of systems Crackers: illegally break into other people’s secure systems and networks Cyber Terrorists: threaten and attack other people’s computers to further a social or political agenda

5

6

7

8

9

10

11

12

13

14 1.It exposes the sensitive data of the user and risks user privacy. 2.Modification of important data with intent to achieve personal gain is another effect of computer hacking. 3.It meant to be an illegal use of someone else's identity for personal use. 4.Several key-logging software have been evolved which are capable of tracking and recording key stroke by the user, causing stealing of passwords and account details. 5.If the information related to national security, confidential government data, information related to national defence and security 6.Hacking can be used to convert computer into zombies.

15

16

17

18

19


Download ppt "Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations."

Similar presentations


Ads by Google