SlideShare une entreprise Scribd logo
1  sur  13
HACKING
Prepared by:
Mohd Qhaiyum Shah Bin Raman
Nurul Lisa Bte Mandih
CONTENTS:
 Introduction of Computer Threats
 Definition of Hacking
 Definition of Hackers
 Advantages of Hacking
 Disadvantages of Hacking
 How to Prevent Hacking – (Hacking vs. Firewall)
 Conclusion
 References
Introduction
The computer is a great tool to store important information. In
certain cases, the information is very vital that losing it will
harm the computer system.
Computer threats can come from many ways either from
human or natural disasters. For example, when someone is stealing
your account information from a trusted bank, this threat is
considered as a human threat. However, when your computer is
soaked in heavy rain, then that is a natural disaster threat.
Definition of Hacking
Hacking is a source of threat to security in computer. It is
defined as unauthorized access to the computer
system by a hacker.
Definition of Hacker
Hackers are persons who learn
about the computer system in
detail. They write program
referred to as hacks. Hackers
may use a modem or cable to
hack the targeted computers.
Advantages of Hacking
 Can be used to recover lost information where the
computer password has been lost.
 Teaches us that no technology is 100% secure.
 Hacking is good with games especially when you
are online but the only problem is, if the gaming
server finds out that you have been hacking. Then,
you could get chucked off the gaming
server so watch out!
Disadvantages of
Hacking
 Criminals can use it to their advantage.
 It can harm someone's privacy.
 It's illegal.
 It destroys other people’s work.
Hacking VS. Firewall
Hacking is an unauthorized access to the computer system
done by a hacker. In order to prevent it from happening, we
can use firewall to prevent the hacker from accessing our
computers.
A firewall permits limited access to unauthorized users
or any activities from the network environment.
The logo of
Firewall
Conclusion
Hackers are just people with innovative spirits and an in-depth
knowledge of technology. Hackers aren't necessarily criminals,
though as long as crime has the potential to pay, there will always be
some criminals who are hackers. There's nothing wrong with the
hacker knowledge itself, despite its potential applications.
Therefore, do whatever you like as long as you didn’t make
other people suffered and devastated on your own action.
References
1. Books:
• ICT Resource Book (Form 4)
• ICT Mind Map Note Version 2.0 (Form 4 & 5)
2. URL’s (Internet):
• http://en.wikipedia.org/wiki/Hacker
• http://en.wikipedia.org/wiki/Hacking
That’s All
From Us
Thank You
For Listening!


Contenu connexe

Tendances (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

En vedette

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Assignment ICT Multimedia 'Pembentukan Pelangi'
Assignment  ICT Multimedia 'Pembentukan Pelangi'Assignment  ICT Multimedia 'Pembentukan Pelangi'
Assignment ICT Multimedia 'Pembentukan Pelangi'Nuzue LieYana
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)Zul Azmi
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationMuhd Airil
 
Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4cikguchaen
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4D.J Md Thani
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
FILOSOF ISLAM AL-KHAWARIZMI
FILOSOF ISLAM AL-KHAWARIZMIFILOSOF ISLAM AL-KHAWARIZMI
FILOSOF ISLAM AL-KHAWARIZMIGita Septiana
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefCamp
 

En vedette (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Assignment ICT Multimedia 'Pembentukan Pelangi'
Assignment  ICT Multimedia 'Pembentukan Pelangi'Assignment  ICT Multimedia 'Pembentukan Pelangi'
Assignment ICT Multimedia 'Pembentukan Pelangi'
 
Hacking
HackingHacking
Hacking
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Penggodaman
PenggodamanPenggodaman
Penggodaman
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
 
Penggodaman
Penggodaman Penggodaman
Penggodaman
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
FILOSOF ISLAM AL-KHAWARIZMI
FILOSOF ISLAM AL-KHAWARIZMIFILOSOF ISLAM AL-KHAWARIZMI
FILOSOF ISLAM AL-KHAWARIZMI
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
 

Similaire à ICT Form 4: Hacking

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxAnshumaanTiwari2
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersJahaSoft
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 

Similaire à ICT Form 4: Hacking (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie Hackers
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 

Plus de Qhaiyum Shah

CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam
CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam
CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam Qhaiyum Shah
 
Chapter 3 - Electromagnetism, 3.5 Generation & Transmission of Electricity
Chapter 3 - Electromagnetism, 3.5 Generation & Transmission of ElectricityChapter 3 - Electromagnetism, 3.5 Generation & Transmission of Electricity
Chapter 3 - Electromagnetism, 3.5 Generation & Transmission of ElectricityQhaiyum Shah
 
Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...
Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...
Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...Qhaiyum Shah
 
Phycis Form 5: Chapter 1.4 Diffraction of Waves
Phycis Form 5: Chapter 1.4 Diffraction of WavesPhycis Form 5: Chapter 1.4 Diffraction of Waves
Phycis Form 5: Chapter 1.4 Diffraction of WavesQhaiyum Shah
 
Biology Form 4: Chapter 8.2 Colonisation and Succession in an Ecosystem
Biology Form 4: Chapter 8.2 Colonisation and Succession in an EcosystemBiology Form 4: Chapter 8.2 Colonisation and Succession in an Ecosystem
Biology Form 4: Chapter 8.2 Colonisation and Succession in an EcosystemQhaiyum Shah
 
Pend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal Rahimahullah
Pend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal RahimahullahPend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal Rahimahullah
Pend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal RahimahullahQhaiyum Shah
 
Biology Form 4: Chapter 8.4 Biodiversity
Biology Form 4: Chapter 8.4 BiodiversityBiology Form 4: Chapter 8.4 Biodiversity
Biology Form 4: Chapter 8.4 BiodiversityQhaiyum Shah
 
Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...
Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...
Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...Qhaiyum Shah
 

Plus de Qhaiyum Shah (8)

CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam
CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam
CTU211: Sains dan Teknologi Islam - Pengklonan Dalam Islam
 
Chapter 3 - Electromagnetism, 3.5 Generation & Transmission of Electricity
Chapter 3 - Electromagnetism, 3.5 Generation & Transmission of ElectricityChapter 3 - Electromagnetism, 3.5 Generation & Transmission of Electricity
Chapter 3 - Electromagnetism, 3.5 Generation & Transmission of Electricity
 
Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...
Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...
Pend. Agama Islam Tingkatan 4 - Sirah: As-Syeikh Muhammad Abduh (Tokoh Islah ...
 
Phycis Form 5: Chapter 1.4 Diffraction of Waves
Phycis Form 5: Chapter 1.4 Diffraction of WavesPhycis Form 5: Chapter 1.4 Diffraction of Waves
Phycis Form 5: Chapter 1.4 Diffraction of Waves
 
Biology Form 4: Chapter 8.2 Colonisation and Succession in an Ecosystem
Biology Form 4: Chapter 8.2 Colonisation and Succession in an EcosystemBiology Form 4: Chapter 8.2 Colonisation and Succession in an Ecosystem
Biology Form 4: Chapter 8.2 Colonisation and Succession in an Ecosystem
 
Pend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal Rahimahullah
Pend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal RahimahullahPend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal Rahimahullah
Pend. Agama Islam Tingkatan 4 - Sirah: Imam Ahmad bin Hanbal Rahimahullah
 
Biology Form 4: Chapter 8.4 Biodiversity
Biology Form 4: Chapter 8.4 BiodiversityBiology Form 4: Chapter 8.4 Biodiversity
Biology Form 4: Chapter 8.4 Biodiversity
 
Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...
Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...
Sejarah Tingkatan 4 - Bab 6: Pembentukan Kerajaan Islam & Sumbangannya (Keraj...
 

Dernier

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Dernier (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

ICT Form 4: Hacking

  • 1. HACKING Prepared by: Mohd Qhaiyum Shah Bin Raman Nurul Lisa Bte Mandih
  • 2. CONTENTS:  Introduction of Computer Threats  Definition of Hacking  Definition of Hackers  Advantages of Hacking  Disadvantages of Hacking  How to Prevent Hacking – (Hacking vs. Firewall)  Conclusion  References
  • 3. Introduction The computer is a great tool to store important information. In certain cases, the information is very vital that losing it will harm the computer system.
  • 4. Computer threats can come from many ways either from human or natural disasters. For example, when someone is stealing your account information from a trusted bank, this threat is considered as a human threat. However, when your computer is soaked in heavy rain, then that is a natural disaster threat.
  • 5. Definition of Hacking Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker.
  • 6. Definition of Hacker Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.
  • 7. Advantages of Hacking  Can be used to recover lost information where the computer password has been lost.  Teaches us that no technology is 100% secure.  Hacking is good with games especially when you are online but the only problem is, if the gaming server finds out that you have been hacking. Then, you could get chucked off the gaming server so watch out!
  • 8. Disadvantages of Hacking  Criminals can use it to their advantage.  It can harm someone's privacy.  It's illegal.  It destroys other people’s work.
  • 9. Hacking VS. Firewall Hacking is an unauthorized access to the computer system done by a hacker. In order to prevent it from happening, we can use firewall to prevent the hacker from accessing our computers. A firewall permits limited access to unauthorized users or any activities from the network environment. The logo of Firewall
  • 10.
  • 11. Conclusion Hackers are just people with innovative spirits and an in-depth knowledge of technology. Hackers aren't necessarily criminals, though as long as crime has the potential to pay, there will always be some criminals who are hackers. There's nothing wrong with the hacker knowledge itself, despite its potential applications. Therefore, do whatever you like as long as you didn’t make other people suffered and devastated on your own action.
  • 12. References 1. Books: • ICT Resource Book (Form 4) • ICT Mind Map Note Version 2.0 (Form 4 & 5) 2. URL’s (Internet): • http://en.wikipedia.org/wiki/Hacker • http://en.wikipedia.org/wiki/Hacking
  • 13. That’s All From Us Thank You For Listening! 