Download presentation
Presentation is loading. Please wait.
Published byThomasine Green Modified over 8 years ago
1
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
2
What is H@cking ? Hacking is the process of achieving access to a computer or computer network without legal authorization. Hacking is to steal ones secret by breaking security like free internet, free calls, stealing ones mail etc,. i.e. Unauthorized access of computer
3
What factors does to attack ? Curiosity Money Spying Prestige Intellectual Challenge Anarchy
4
Why Do Hackers Attack? A challenge, or “to see if I can” Obtain a company’s secrets or insider information Steal credit card numbers Steal passwords to other systems To steal programs or files Read others’ email Stalking
5
There are two major types of hacking: White Hat Hacking Black Hat Hacking
6
White Hat Hacking: White hat hacking is a positive type of hacking. Also called as Ethical Hacking. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking.
7
Black Hat Hacking: A black Hat Hackers is a negative type of Hacking. A black hat hacker, also known as a cracker or a dark side hacker. Someone who uses his skills with a criminal intent. E.g. cracking bank, or attacking the computer network of an organization for money.
8
There are three main levels of hacking. 1. Local Hacking. 2. Social Networking Hacking. 3. Remote Hacking
9
Types Of Hacking which comes under black & white hat Hacking 1)Inside Jobs 2) Rogue Access Points 3) Back Doors 4) Denial of Service 5) Sniffing and Spoofing
10
FIREWALL: It is a system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect “inside” network from “outside network.
11
Seven simple things to protect our system from hackers Implement a firewall Develop a corporate security policy Install anti-virus software Keep operating systems up to date Don't run unnecessary network services Conduct a vulnerability test Keep informed about network security
12
Conclusion: A level-headed approach should be taken by all Internet users to protect their privacy and security online. And to ensure that they have to educate and inform themselves of the more serious risks involved in maintaining any kind of Internet presence.
13
References: Hacker http://www.net-security.org/text/articleshttp://www.net-security.org/text/articles /index-security.php Hacking Techniques: http://www.securitywatch.com Hacking: www.google.com
14
? ? ? ? ? ? ?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.