SlideShare une entreprise Scribd logo
1  sur  64
Presentation of :
“Communication Skills”
Presented to:
Sir Asad Mobeen
Presented by:
Aniqa Javed
Farwa Abdul Hannan
Ammarah Khalid
“Hackers”
What is Hacker???
 Hacker is a term used to mean "a
clever programmer’’
Especially those in popular media, to
mean “someone who tries to break
into computer systems”.
 There are many definition of hacking as
well as varying ideas of what a hacker is
or does.
 A hacker is a person of good taste.
People who hack computers are known as
hackers.
Why Do Hackers Hack?
Just for fun
Show off
Hack other systems secretly
Notify many people their own
thought
Steal important information
Destroy enemy’s computer network
How to translate the hackers’
language?
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
How to translate the hackers’
language?
• Example:
–1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3n 1 h4ck3d 1n
–I did not hack this page, it was like this
when I hacked in
How can be a real Hacker ?
• Study C/C++
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools
• Think the problem of the computer
Types of Hackers:
• Black hat
• White hat
• Grey hat
• Script Kiddie
• Neophyte
• Blue hat
• Hacktivist
Black Hat Hacker
1. Black hat:
Black hat hackers always do illegal work.
They work for black money.
They hack into bank websites, credit card
websites and stole money from account in
bank websites.
They are professionals in their fields.
They use their knowledge for illegal
purpose.
A black hat hacker is the bad guy.
White hat hacker
2. White hat:
 breaks security for non-malicious reasons
 perhaps to test their own security system
 While working for a security company which
makes security software.
 In fact, a large number of white hat hackers
are security experts themselves who want to
push the boundaries of their own IT security.
 In fact, the National Security Agency (NSA)
offers certifications to these hackers.
Gray Hat Hacker
3. Grey hat:
• A grey hat hacker is a combination of a
black hat and a white hat hacker.
• A grey hat hacker may surf the internet
and hack into a computer system for the
sole purpose of notifying the
administrator that their system has a
security defect.
Script kiddie
4. Script kiddie:
• A script kiddie is basically a non-expert hacker.
• A hacker who breaks into people's computer
systems not through his knowledge in IT
security.
• Mostly kids/students
• User tools created by black hats
• To get free stuff
• Impress their peers
• Not get caught
Neophyte
5. Neophyte:
• A neophyte means “newcomer” or
“newbie”.
• someone who is new to hacking
• Has almost no knowledge or
experience of the workings of
technology and hacking.
Blue hat hacker
6. Blue hat:
• A blue hat hacker is someone outside
computer security consulting firms.
• Who is used to bug test a system former
to its launch, looking for exploits so they
can be closed.
• Microsoft also uses the term Blue Hat to
represent a series of security briefing
events.
Hacktivist
8. Hacktivist
• A Hacktivist is a hacker who utilizes
technology to announce a social,
ideological, religious, or political
message.
• They use the same tools and techniques
as a hacker.
• They does so in order to disrupt services
and bring attention to a political and
social causes.
By:
Farwa Abdul
Hannan
World’s some famous
Hackers and their few
attacks
Hackers
1. Albert "segvec"
Gonzalez
2. Jonathan James
3. Ian Murphy
4. Phreaker John Draper
5. Robert Tappan Morris
6. Kevin Poulson
7. Gary McKinnon
Albert "segvec"
Gonzalez
• Born in 1981
• An American Computer Hacker &
Computer Criminal
• ShadowCrew - screen name
"CumbaJohnny"
Trafficked stolen credit and ATM card
numbers
• Hacked the databases of TJX
Companies - 45.6 million credit and
debit card numbers
• Heartland Payment
Systems, Citibank
• Hacked computer systems of the
government of India
• Arrested on May 7, 2008 - was
sentenced to prison for 20 years
List of sites from which I collected data
related to Albert “segvec” Gonzalez
1. http://en.wikipedia.org/wiki/Albert_Gonzalez
2. http://www.time.com/time/business/article/0,8599,1
917345,00.html
3. http://www.wired.com/science/discoveries/news/200
1/02/41630
4. http://en.wikipedia.org/wiki/Code_injection
http://en.wikipedia.org/wiki/Backdoor_(computing)
5. http://www.neatorama.com/2006/08/28/a-short-
history-of-hacking/
Jonathan
James
 Born on December 12,
1983, United States of America
 c0mrade
 Hacked software of NASA
 Hacked software of DOD -
Between August 23, 1999, and
October 27, 1999
 Arrested and sentenced to six
months
 Died on May 18, 2008
List of sites from which I collected
data related to Jonathon James
1. http://en.wikipedia.org/wiki/Jonathan_Jame
s
2. http://www.jonathanjames.com/
3. https://www.facebook.com/pages/Jonathan-
james-hacker/268732283193175
4. http://www.linkedin.com/in/jonathankjames
Ian Murphy
Name in Hacking World –
Captain Zap
 First Cracker
 Hacked AT&T’s
Computers (1981)
He also provided the
inspiration for the 1992
film "Sneakers."
 now the chairman of
Secure Data System (SDS)
- A data security Company
List of sites from which I collected
data related to Ian Murphy
1. https://twitter.com/Ian_Murphy
2. http://www.linkedin.com/pub/ian-murphy/25/88a/499
3. http://www.neatorama.com/2006/08/28/a-short-history-
of-hacking/
4. http://hackstory.net/Captain_Zap
5. http://attrition.org/errata/charlatan/ian_murphy/threat_p
rofile/
Phreaker John
Draper
 Born in 1943, also known
as Captain Crunch , Crunch
or Crunchman
 well known phone hacker/
phreaker
 How he hacked?
 Continued…
Tools Used by Phreaker John Draper
 A phreaking
whistle
 A Blue Box
 Discovered
these methods
in 1971
 Arrested for 2
times – in 1972,
1976
List of sites from which I collected
data related to Phreaker John Draper
1. http://www.neatorama.com/2006/08/28/a-short-history-
of-hacking/
2. http://www.wired.com/science/discoveries/news/2001/0
2/41630
3. http://en.wikipedia.org/wiki/John_Draper
4. http://mentalfloss.com/article/19484/true-crime-john-
draper-original-whistle-blower
5. http://www.infostruction.com/2011/09/12/10-hackers-
who-made-history/
6. http://www.livinginternet.com/i/ia_hackers_draper.htm
7. http://en.wikipedia.org/wiki/Blue_box
Robert Tappan
Morris
 born on November 8,
1965
 An American computer
scientist, best known
for creating the Morris
Worm in 1988
 About Worm – The
Morris Worm
 Lives in United States –
Age 48 years
List of sites from which I collected
data related to Robert Tappan Morris
1. http://en.wikipedia.org/wiki/Morris_worm
2. http://en.wikipedia.org/wiki/Robert_Tappan
_Morris
Kevin Poulson
 Among Hackers he is known as
“Dark Dante” – born on Nov. 30
1965
 Hacked FBI’s computers & phones
& stole Documents
 hacked all phone lines running
into Los Angeles radio station
 In April 1991, he was arrested
 Released after paying more than
$50,000 (5,182,500 Rs) and serving
51 months in prison
. Today, he is the senior editor
of Wired magazine.
Kevin Poulson's Porsche 944 S2
List of sites from which I collected
data related to Kevin Poulson
1. https://www.facebook.com/kevin.mitnickhac
k
2. http://www.takedown.com/bio/mitnick.html
3. http://en.wikipedia.org/wiki/Kevin_Poulsen
4. http://hackstory.net/Kevin_L._Poulsen
5. http://en.wikipedia.org/wiki/Wired_(magazi
ne)
Gary McKinnon
 Born on 10 February 1966 –
a Scottishsystems administrator
and hacker
 In Hackers known as “solo”
 hack military computers
 Illegally gained access to 97
computers - 13-month period from
February 2001 to March 2002.
 He deleted a number of critical files,
over 300 computers and resulting in
over $700,000(72,555,001 Rs) in
damages.
List of sites from which I collected
data related to Gary McKinnon
1. http://en.wikipedia.org/wiki/Gary_McKinnon
2. http://freegary.org.uk/
3. http://www.theguardian.com/world/gary-
mckinnon
“PREVENTION FROM HACKERS”
Ammarah Khalid
Some common ways to prevent your device
from being hacked are:
1) OS Updates
2) Software Updates
3) Installing Anti-Virus Software
4) Installing Anti-Spyware Software
5) Stop using Hacker Controlled Websites
6) Use Firewall
7) Data Backup
8) Avoid Spam Emails
9) Password Policies
10) Clear the Cookies
11) Don’t use generic user names
12) Keep your identity safe
Operating System Updates:
Hackers attack:
• Where they find weakness.
• A system ( not updated ) has flaws.
• So update your system regularly.
Software Updates:
Get the latest fixes or versions of :
• Applications installed on your computer
• Web based software
Installing Anti-Virus Software:
Install anti-virus software as soon as you can, and always
confirm if its virus definitions are regularly updated.
Installing Anti-Spyware Software:
A type of intrusion that:
• Slows down your computer
• Put advertisements
• Put pop-ups on the screen
• And can lead to identity theft
• So install anti-spyware as
soon as possible!
Stop using Hacker Controlled Websites:
In World Wide Web, avoid from:
1) Sites containing free downloads.
2) Online games.
“They are mostly controlled by hackers!”
Continue..
For ensuring a secure website:
• Check site-lock sign on Title bar
• https:// is written in caption below the title bar
instead of http://
Use Firewall:
Firewalls forbids:
• Outside threats (i.e. from hackers)
• Viruses from gaining access to your system.
• Control the traffic across connection
• Personalize your firewall settings
• Update it regularly
Continue.. (FIREWALL)
Data Backup:
The sensitive bits of
information can be wiped
clean from your hard
drive in the blink of an
eye..
“So it's best to always
have a backup at hand”.
Avoid Spam Emails:
Never click on an emailed link that looks
questionable. Delete them!
Password Policies:
Use:
• Multiple, intricate passwords
• Combinations of letters and numbers
• Make sure that your password is not too difficult for you to
remember it!
Clear the Cookies:
Do not forget to
clear the cookies
and cache before
you leave!
Don’t use generic user names:
Do not use usernames such as:
• admin
• administrator
• Site Owner
Try to use unlimited range of combinations for
names.
Keep your Identity Safe
1) Do not use official email ID to subscribe
to the public groups.
2) Do not share and post professional
information on Social networks.
“Learn new technologies and techniques
for protection against hackers and keep
aware! “
1. http://www.blogussion.c
om/blogging-tips/ten-
tips-to-prevent-hackers/
2. http://www.secpoint.co
m/Top-10-Ways-to-
Protect-Your-
Computer.html#ixzz2cRJt
wVdo
3. http://www.wikihow.com
/Prevent-Hacking
Communication Skills Presentation Security Tips

Contenu connexe

Tendances

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 

Tendances (20)

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Social engineering
Social engineering Social engineering
Social engineering
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
HACKING
HACKINGHACKING
HACKING
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Bug Bounty 101
Bug Bounty 101Bug Bounty 101
Bug Bounty 101
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Hacking
HackingHacking
Hacking
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

En vedette

Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmmandynova
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefCamp
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikaSarika Dyne
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Peter Timusk
 
Introduction to Growth Hacking
Introduction to Growth HackingIntroduction to Growth Hacking
Introduction to Growth HackingRadek Grabarek
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesRonan Dunne, CEH, SSCP
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Manual of JAVA (more than Half)
Manual of JAVA (more than Half)Manual of JAVA (more than Half)
Manual of JAVA (more than Half)Farwa Ansari
 
Javadocx j option pane
Javadocx j option paneJavadocx j option pane
Javadocx j option paneFarwa Ansari
 
Applications of Image Processing
Applications of Image ProcessingApplications of Image Processing
Applications of Image ProcessingFarwa Ansari
 

En vedette (20)

Web defacement
Web defacementWeb defacement
Web defacement
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking Psychology
Hacking PsychologyHacking Psychology
Hacking Psychology
 
Introduction to Growth Hacking
Introduction to Growth HackingIntroduction to Growth Hacking
Introduction to Growth Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Manual of JAVA (more than Half)
Manual of JAVA (more than Half)Manual of JAVA (more than Half)
Manual of JAVA (more than Half)
 
Javadocx j option pane
Javadocx j option paneJavadocx j option pane
Javadocx j option pane
 
Applications of Image Processing
Applications of Image ProcessingApplications of Image Processing
Applications of Image Processing
 

Similaire à Communication Skills Presentation Security Tips

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
 
Hacking
HackingHacking
HackingVirus
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 

Similaire à Communication Skills Presentation Security Tips (20)

Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking
HackingHacking
Hacking
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 

Plus de Farwa Ansari

Energy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A SurveyEnergy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A SurveyFarwa Ansari
 
Micro-services architecture
Micro-services architectureMicro-services architecture
Micro-services architectureFarwa Ansari
 
Software Design Patterns - An Overview
Software Design Patterns - An OverviewSoftware Design Patterns - An Overview
Software Design Patterns - An OverviewFarwa Ansari
 
Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...Farwa Ansari
 
Fault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overviewFault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overviewFarwa Ansari
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
 
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Farwa Ansari
 
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)Farwa Ansari
 
Business plan of a software house
Business plan of a software houseBusiness plan of a software house
Business plan of a software houseFarwa Ansari
 
Mission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different CompaniesMission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different CompaniesFarwa Ansari
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithmFarwa Ansari
 
Raster images (assignment)
Raster images (assignment)Raster images (assignment)
Raster images (assignment)Farwa Ansari
 
Prefix and suffix of open gl
Prefix and suffix of open glPrefix and suffix of open gl
Prefix and suffix of open glFarwa Ansari
 
Linear combination of vector
Linear combination of vectorLinear combination of vector
Linear combination of vectorFarwa Ansari
 
Graphic display devices
Graphic display devicesGraphic display devices
Graphic display devicesFarwa Ansari
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6 Farwa Ansari
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challengesFarwa Ansari
 
Tomasulo Algorithm
Tomasulo AlgorithmTomasulo Algorithm
Tomasulo AlgorithmFarwa Ansari
 
Summary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip ParallelismSummary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip ParallelismFarwa Ansari
 

Plus de Farwa Ansari (20)

Energy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A SurveyEnergy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A Survey
 
Micro-services architecture
Micro-services architectureMicro-services architecture
Micro-services architecture
 
Software Design Patterns - An Overview
Software Design Patterns - An OverviewSoftware Design Patterns - An Overview
Software Design Patterns - An Overview
 
Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...
 
Fault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overviewFault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overview
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
 
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
 
Business plan of a software house
Business plan of a software houseBusiness plan of a software house
Business plan of a software house
 
Mission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different CompaniesMission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different Companies
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithm
 
Scaling
ScalingScaling
Scaling
 
Raster images (assignment)
Raster images (assignment)Raster images (assignment)
Raster images (assignment)
 
Prefix and suffix of open gl
Prefix and suffix of open glPrefix and suffix of open gl
Prefix and suffix of open gl
 
Linear combination of vector
Linear combination of vectorLinear combination of vector
Linear combination of vector
 
Graphic display devices
Graphic display devicesGraphic display devices
Graphic display devices
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
 
Tomasulo Algorithm
Tomasulo AlgorithmTomasulo Algorithm
Tomasulo Algorithm
 
Summary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip ParallelismSummary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
 

Dernier

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 

Dernier (20)

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 

Communication Skills Presentation Security Tips

  • 1.
  • 2. Presentation of : “Communication Skills” Presented to: Sir Asad Mobeen Presented by: Aniqa Javed Farwa Abdul Hannan Ammarah Khalid
  • 4. What is Hacker???  Hacker is a term used to mean "a clever programmer’’ Especially those in popular media, to mean “someone who tries to break into computer systems”.
  • 5.  There are many definition of hacking as well as varying ideas of what a hacker is or does.  A hacker is a person of good taste. People who hack computers are known as hackers.
  • 6. Why Do Hackers Hack? Just for fun Show off Hack other systems secretly Notify many people their own thought Steal important information Destroy enemy’s computer network
  • 7. How to translate the hackers’ language? 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 8. How to translate the hackers’ language? • Example: –1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n –I did not hack this page, it was like this when I hacked in
  • 9. How can be a real Hacker ? • Study C/C++ • Study computer architecture • Study operating system • Study computer network • Examine the hacking tools • Think the problem of the computer
  • 10.
  • 11. Types of Hackers: • Black hat • White hat • Grey hat • Script Kiddie • Neophyte • Blue hat • Hacktivist
  • 13. 1. Black hat: Black hat hackers always do illegal work. They work for black money. They hack into bank websites, credit card websites and stole money from account in bank websites. They are professionals in their fields. They use their knowledge for illegal purpose. A black hat hacker is the bad guy.
  • 15. 2. White hat:  breaks security for non-malicious reasons  perhaps to test their own security system  While working for a security company which makes security software.  In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security.  In fact, the National Security Agency (NSA) offers certifications to these hackers.
  • 17. 3. Grey hat: • A grey hat hacker is a combination of a black hat and a white hat hacker. • A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect.
  • 19. 4. Script kiddie: • A script kiddie is basically a non-expert hacker. • A hacker who breaks into people's computer systems not through his knowledge in IT security. • Mostly kids/students • User tools created by black hats • To get free stuff • Impress their peers • Not get caught
  • 20.
  • 22. 5. Neophyte: • A neophyte means “newcomer” or “newbie”. • someone who is new to hacking • Has almost no knowledge or experience of the workings of technology and hacking.
  • 24. 6. Blue hat: • A blue hat hacker is someone outside computer security consulting firms. • Who is used to bug test a system former to its launch, looking for exploits so they can be closed. • Microsoft also uses the term Blue Hat to represent a series of security briefing events.
  • 26. 8. Hacktivist • A Hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. • They use the same tools and techniques as a hacker. • They does so in order to disrupt services and bring attention to a political and social causes.
  • 28. World’s some famous Hackers and their few attacks
  • 29. Hackers 1. Albert "segvec" Gonzalez 2. Jonathan James 3. Ian Murphy 4. Phreaker John Draper 5. Robert Tappan Morris 6. Kevin Poulson 7. Gary McKinnon
  • 30. Albert "segvec" Gonzalez • Born in 1981 • An American Computer Hacker & Computer Criminal • ShadowCrew - screen name "CumbaJohnny" Trafficked stolen credit and ATM card numbers • Hacked the databases of TJX Companies - 45.6 million credit and debit card numbers • Heartland Payment Systems, Citibank • Hacked computer systems of the government of India • Arrested on May 7, 2008 - was sentenced to prison for 20 years
  • 31. List of sites from which I collected data related to Albert “segvec” Gonzalez 1. http://en.wikipedia.org/wiki/Albert_Gonzalez 2. http://www.time.com/time/business/article/0,8599,1 917345,00.html 3. http://www.wired.com/science/discoveries/news/200 1/02/41630 4. http://en.wikipedia.org/wiki/Code_injection http://en.wikipedia.org/wiki/Backdoor_(computing) 5. http://www.neatorama.com/2006/08/28/a-short- history-of-hacking/
  • 32. Jonathan James  Born on December 12, 1983, United States of America  c0mrade  Hacked software of NASA  Hacked software of DOD - Between August 23, 1999, and October 27, 1999  Arrested and sentenced to six months  Died on May 18, 2008
  • 33. List of sites from which I collected data related to Jonathon James 1. http://en.wikipedia.org/wiki/Jonathan_Jame s 2. http://www.jonathanjames.com/ 3. https://www.facebook.com/pages/Jonathan- james-hacker/268732283193175 4. http://www.linkedin.com/in/jonathankjames
  • 34. Ian Murphy Name in Hacking World – Captain Zap  First Cracker  Hacked AT&T’s Computers (1981) He also provided the inspiration for the 1992 film "Sneakers."  now the chairman of Secure Data System (SDS) - A data security Company
  • 35. List of sites from which I collected data related to Ian Murphy 1. https://twitter.com/Ian_Murphy 2. http://www.linkedin.com/pub/ian-murphy/25/88a/499 3. http://www.neatorama.com/2006/08/28/a-short-history- of-hacking/ 4. http://hackstory.net/Captain_Zap 5. http://attrition.org/errata/charlatan/ian_murphy/threat_p rofile/
  • 36. Phreaker John Draper  Born in 1943, also known as Captain Crunch , Crunch or Crunchman  well known phone hacker/ phreaker  How he hacked?  Continued…
  • 37. Tools Used by Phreaker John Draper  A phreaking whistle  A Blue Box  Discovered these methods in 1971  Arrested for 2 times – in 1972, 1976
  • 38. List of sites from which I collected data related to Phreaker John Draper 1. http://www.neatorama.com/2006/08/28/a-short-history- of-hacking/ 2. http://www.wired.com/science/discoveries/news/2001/0 2/41630 3. http://en.wikipedia.org/wiki/John_Draper 4. http://mentalfloss.com/article/19484/true-crime-john- draper-original-whistle-blower 5. http://www.infostruction.com/2011/09/12/10-hackers- who-made-history/ 6. http://www.livinginternet.com/i/ia_hackers_draper.htm 7. http://en.wikipedia.org/wiki/Blue_box
  • 39. Robert Tappan Morris  born on November 8, 1965  An American computer scientist, best known for creating the Morris Worm in 1988  About Worm – The Morris Worm  Lives in United States – Age 48 years
  • 40. List of sites from which I collected data related to Robert Tappan Morris 1. http://en.wikipedia.org/wiki/Morris_worm 2. http://en.wikipedia.org/wiki/Robert_Tappan _Morris
  • 41. Kevin Poulson  Among Hackers he is known as “Dark Dante” – born on Nov. 30 1965  Hacked FBI’s computers & phones & stole Documents  hacked all phone lines running into Los Angeles radio station  In April 1991, he was arrested  Released after paying more than $50,000 (5,182,500 Rs) and serving 51 months in prison . Today, he is the senior editor of Wired magazine.
  • 43. List of sites from which I collected data related to Kevin Poulson 1. https://www.facebook.com/kevin.mitnickhac k 2. http://www.takedown.com/bio/mitnick.html 3. http://en.wikipedia.org/wiki/Kevin_Poulsen 4. http://hackstory.net/Kevin_L._Poulsen 5. http://en.wikipedia.org/wiki/Wired_(magazi ne)
  • 44. Gary McKinnon  Born on 10 February 1966 – a Scottishsystems administrator and hacker  In Hackers known as “solo”  hack military computers  Illegally gained access to 97 computers - 13-month period from February 2001 to March 2002.  He deleted a number of critical files, over 300 computers and resulting in over $700,000(72,555,001 Rs) in damages.
  • 45. List of sites from which I collected data related to Gary McKinnon 1. http://en.wikipedia.org/wiki/Gary_McKinnon 2. http://freegary.org.uk/ 3. http://www.theguardian.com/world/gary- mckinnon
  • 47. Some common ways to prevent your device from being hacked are: 1) OS Updates 2) Software Updates 3) Installing Anti-Virus Software 4) Installing Anti-Spyware Software 5) Stop using Hacker Controlled Websites 6) Use Firewall 7) Data Backup 8) Avoid Spam Emails 9) Password Policies 10) Clear the Cookies 11) Don’t use generic user names 12) Keep your identity safe
  • 48. Operating System Updates: Hackers attack: • Where they find weakness. • A system ( not updated ) has flaws. • So update your system regularly.
  • 49. Software Updates: Get the latest fixes or versions of : • Applications installed on your computer • Web based software
  • 50. Installing Anti-Virus Software: Install anti-virus software as soon as you can, and always confirm if its virus definitions are regularly updated.
  • 51. Installing Anti-Spyware Software: A type of intrusion that: • Slows down your computer • Put advertisements • Put pop-ups on the screen • And can lead to identity theft • So install anti-spyware as soon as possible!
  • 52. Stop using Hacker Controlled Websites: In World Wide Web, avoid from: 1) Sites containing free downloads. 2) Online games. “They are mostly controlled by hackers!”
  • 53. Continue.. For ensuring a secure website: • Check site-lock sign on Title bar • https:// is written in caption below the title bar instead of http://
  • 54. Use Firewall: Firewalls forbids: • Outside threats (i.e. from hackers) • Viruses from gaining access to your system. • Control the traffic across connection • Personalize your firewall settings • Update it regularly
  • 56. Data Backup: The sensitive bits of information can be wiped clean from your hard drive in the blink of an eye.. “So it's best to always have a backup at hand”.
  • 57. Avoid Spam Emails: Never click on an emailed link that looks questionable. Delete them!
  • 58. Password Policies: Use: • Multiple, intricate passwords • Combinations of letters and numbers • Make sure that your password is not too difficult for you to remember it!
  • 59. Clear the Cookies: Do not forget to clear the cookies and cache before you leave!
  • 60. Don’t use generic user names: Do not use usernames such as: • admin • administrator • Site Owner Try to use unlimited range of combinations for names.
  • 61. Keep your Identity Safe 1) Do not use official email ID to subscribe to the public groups. 2) Do not share and post professional information on Social networks. “Learn new technologies and techniques for protection against hackers and keep aware! “
  • 62.