SlideShare une entreprise Scribd logo
1  sur  30
A SEMINAR BY
---JASMINE.A.JAMAN
CONTENTS
1. What is Hacking?
2. History of Hacking
3. Who is Hacker?
4. Famous Hackers in History
5. Why do Hackers Hack?
6. Types of Hacking
7. Techniques of Hacking
8. How to give a password to an account
9. What should do after hacked
10. How to secure our data
11. Advantages of Hacking
12. Disadvantages of Hacking
13. Conclusion
14. Questions
WHAT IS HACKING?
• The process of attempting to gain or successfully gaining ,
unauthorized access to computer resources is called
Hacking
• Hacking refers to an array of activities which are done to
intrude someone else’s personal information so as to use it
for malicious , unwanted purposes.
HISTORY OF HACKING
• Hacking has been part of Computing for nearly 40 years .
• First hacker emerged at MIT in 1960.
• 1960s: Interestingly, the term “hack” did not originate
from computers. Rather, it originated with MIT's Tech
Model Railroad Club way back in 1961 when club
members hacked their high-tech train sets in order to
modify their functions .
WHO IS HACKER?
• In the computer security context , Hacker
is the one who seeks and exploits
weakness in the computer system or
computer network.
• The term Hackers is reclaimed by
computer programmers who argue that
someone who breaks into computers must
be called as Cracker.
WHY DO HACKERS HACK?
Just for fun.
Show off.
 Hack others systems secretly.
Notify many people their thought .
Steal important information.
Destroy enemy’s computer network during war.
TYPES OF HACKING
• Website Hacking
• Network Hacking
• Ethical Hacking
• Email Hacking
• Password Hacking
• Online Banking Hacking
• Computer Hacking
WEBSITE HACKING
• Hacking a Website means taking
overall control of the website from
the website owner to the person who
hacks the website.
NETWORK HACKING
• Network Hacking is generally means
gathering information about domain
by using tools like Telnet, NslookUp,
Ping, Tracert, Netstat, etc. It also
includes OS Fingerprinting , Port
Scanning and Port Surfing using
various tools.
ETHICAL HACKING
• Ethical Hacking is where a person
hacks to find weakness in the system
and usually patches them.
• Ethical Hacking is also known as
Penetration testing, Intrusion testing,
or Red teaming.
EMAIL HACKING
• Email Hacking is the unauthorized access to, or manipulation
of, an email account or email correspondence.
PASSWORD HACKING
• Password Hacking, sometimes referred to as password
cracking, is a method of recovering passwords from data
transmitted by or stored on a computer
ONLINE BANKING HACKING
• Unauthorised accessing of bank accounts without the permission
of account holder is known as Online Banking Hacking.
COMPUTER HACKING
• Computer Hacking refers to the practice of modifying or
altering computer software and hardware to accomplish a
goal that is considered to be outside of the creator's original
objective.
• Computer Hacking is when files on the computer are
viewed, created or edited without Computer owner’s
authorization.
TECHNIQUES OF HACKING
1.Keylogger:
Keylogger is a simple software that records
the key sequence and strokes of your
keyboard into a log file on your machine. These
log files might even contain your personal
email IDs and passwords.
2. Denial of Service (DoSDDoS):
A Denial of Service attack is a hacking
technique to take down a site or server by
flooding that site or server with a lot of traffic
that the server is unable to process all the
requests in the real time and finally crashes
down.
TECHNIQUES OF HACKING
3.Waterhole Attacks: To poison a place ,in
this case, the hacker hits the most accessible
physical point of the Victim.
4. Fake WAP: Hacker uses a software to
fake a wireless access point . WAP connects to the
public place WAP. Once you get connected to the
fake WAP , Hacker can Access your data same as
in above case.
TECHNIQUES OF HACKING
5.Eawesdropping(Passive Attacks):
6.Phishing:
Unlike other attacks which are active in
nature, using a passive attack, a hacker just
monitors the computer systems and networks
to gain some unwanted information.
Phishing is a hacking technique using
which a hacker replicates the most-
accessed sites and traps the victim by
sending that spoofed link.
TECHNIQUES OF HACKING
7.Virus, Trojan etc.:
8.ClickJacking:
Virus or trojans are malicious software
programs which get installed into the victim’s
system and keeps sending the victims data to
the hacker.
ClickJacking is also known by a different
name, UI Redress. In this attack, the hacker
hides the actual UI where the victim is
supposed to click
TECHNIQUES OF HACKING
9.Cookies Theft:
10.Bait & Switch:
The cookies of a browser keep our personal data
such as browsing history, username, and passwords
for different sites that we access. Once the hacker
gets the access to your cookie, he can even
authenticate himself as you on a browser.
Using bait and switch hacking technique,
an attacker can buy advertising spaces on
the websites. Later, when a user clicks on
the ad, he might get directed to a page
that’s infected with malware.
WHAT SHOULD DO AFTER HACKED?
Shutdown the system .
Separate the system from network.
Restore the system with Backup
Reinstall all the programs
Connect the system to the network
Its better to call the police
HOW TO SET A PASSWORD TO YOUR ACCOUNT?
• Use unique passwords for your accounts.
• Choose a combination of letters ,numbers
and symbols to make a unique password.
HOW TO SECURE OUR DATA?
1  i or l
3  e
4  a
+  t
9  g
0  o
$  s
|  i or l
|/|  M
||  N
s  z
c  c
f  ph
Ph  f
x  ks
ks  x
ADVANTAGES OF HACKING
Hacking is quite useful in the following scenarios :
1.To recover lost information, especially in case you lost
your password.
2.To perform penetration testing to strengthen computer and
network security.
3.To put adequate preventative measures in place to prevent
security breaches.
4.To have a computer system that prevents malicious
hackers from gaining access.
DISADVANTAGES OF HACKING
• Hacking is quite dangerous if it is done with harmful
intent. It can cause −
1. Massive security breach.
2. Unauthorized system access on private information.
3. Privacy violation.
4. Hampering system operation.
5. Denial of service attacks.
6. Malicious attack on the system.
CONCLUSION
• Keep your password protected. Your password should be
combination of characters , digits, special symbols. Do
not respond to fake or phishing Email. Whenever you do
any online transaction always keep watch on site whether
the protocol of site is “https” and whether it has a lock
Symbol or not.
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.

Contenu connexe

Tendances (20)

How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking final
Hacking finalHacking final
Hacking final
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 

Similaire à Hacking- Ethical/ Non-ethical, Cyber Security.

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingsxkkjbzq2k
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...GIRISHKUMARBC1
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 

Similaire à Hacking- Ethical/ Non-ethical, Cyber Security. (20)

HACKING
HACKINGHACKING
HACKING
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Plus de JasminJaman1

Virtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented RealityVirtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented RealityJasminJaman1
 
Networking-digital telecommunications network.
Networking-digital telecommunications network.Networking-digital telecommunications network.
Networking-digital telecommunications network.JasminJaman1
 
Blue brain, Virtual Brain.
Blue brain, Virtual Brain.Blue brain, Virtual Brain.
Blue brain, Virtual Brain.JasminJaman1
 
Bill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of MicrosoftBill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of MicrosoftJasminJaman1
 
5 g wireless technology
5 g wireless technology5 g wireless technology
5 g wireless technologyJasminJaman1
 

Plus de JasminJaman1 (6)

Virtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented RealityVirtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented Reality
 
Networking-digital telecommunications network.
Networking-digital telecommunications network.Networking-digital telecommunications network.
Networking-digital telecommunications network.
 
Blue brain, Virtual Brain.
Blue brain, Virtual Brain.Blue brain, Virtual Brain.
Blue brain, Virtual Brain.
 
Bill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of MicrosoftBill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of Microsoft
 
5 g wireless technology
5 g wireless technology5 g wireless technology
5 g wireless technology
 
3 d printing
3 d printing3 d printing
3 d printing
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Hacking- Ethical/ Non-ethical, Cyber Security.

  • 2. CONTENTS 1. What is Hacking? 2. History of Hacking 3. Who is Hacker? 4. Famous Hackers in History 5. Why do Hackers Hack? 6. Types of Hacking 7. Techniques of Hacking 8. How to give a password to an account 9. What should do after hacked 10. How to secure our data 11. Advantages of Hacking 12. Disadvantages of Hacking 13. Conclusion 14. Questions
  • 3. WHAT IS HACKING? • The process of attempting to gain or successfully gaining , unauthorized access to computer resources is called Hacking • Hacking refers to an array of activities which are done to intrude someone else’s personal information so as to use it for malicious , unwanted purposes.
  • 4. HISTORY OF HACKING • Hacking has been part of Computing for nearly 40 years . • First hacker emerged at MIT in 1960. • 1960s: Interestingly, the term “hack” did not originate from computers. Rather, it originated with MIT's Tech Model Railroad Club way back in 1961 when club members hacked their high-tech train sets in order to modify their functions .
  • 5.
  • 6. WHO IS HACKER? • In the computer security context , Hacker is the one who seeks and exploits weakness in the computer system or computer network. • The term Hackers is reclaimed by computer programmers who argue that someone who breaks into computers must be called as Cracker.
  • 7.
  • 8. WHY DO HACKERS HACK? Just for fun. Show off.  Hack others systems secretly. Notify many people their thought . Steal important information. Destroy enemy’s computer network during war.
  • 9. TYPES OF HACKING • Website Hacking • Network Hacking • Ethical Hacking • Email Hacking • Password Hacking • Online Banking Hacking • Computer Hacking
  • 10. WEBSITE HACKING • Hacking a Website means taking overall control of the website from the website owner to the person who hacks the website.
  • 11. NETWORK HACKING • Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting , Port Scanning and Port Surfing using various tools.
  • 12. ETHICAL HACKING • Ethical Hacking is where a person hacks to find weakness in the system and usually patches them. • Ethical Hacking is also known as Penetration testing, Intrusion testing, or Red teaming.
  • 13. EMAIL HACKING • Email Hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.
  • 14. PASSWORD HACKING • Password Hacking, sometimes referred to as password cracking, is a method of recovering passwords from data transmitted by or stored on a computer
  • 15. ONLINE BANKING HACKING • Unauthorised accessing of bank accounts without the permission of account holder is known as Online Banking Hacking.
  • 16. COMPUTER HACKING • Computer Hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. • Computer Hacking is when files on the computer are viewed, created or edited without Computer owner’s authorization.
  • 17. TECHNIQUES OF HACKING 1.Keylogger: Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords. 2. Denial of Service (DoSDDoS): A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.
  • 18. TECHNIQUES OF HACKING 3.Waterhole Attacks: To poison a place ,in this case, the hacker hits the most accessible physical point of the Victim. 4. Fake WAP: Hacker uses a software to fake a wireless access point . WAP connects to the public place WAP. Once you get connected to the fake WAP , Hacker can Access your data same as in above case.
  • 19. TECHNIQUES OF HACKING 5.Eawesdropping(Passive Attacks): 6.Phishing: Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information. Phishing is a hacking technique using which a hacker replicates the most- accessed sites and traps the victim by sending that spoofed link.
  • 20. TECHNIQUES OF HACKING 7.Virus, Trojan etc.: 8.ClickJacking: Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker. ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click
  • 21. TECHNIQUES OF HACKING 9.Cookies Theft: 10.Bait & Switch: The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser. Using bait and switch hacking technique, an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware.
  • 22. WHAT SHOULD DO AFTER HACKED? Shutdown the system . Separate the system from network. Restore the system with Backup Reinstall all the programs Connect the system to the network Its better to call the police
  • 23. HOW TO SET A PASSWORD TO YOUR ACCOUNT? • Use unique passwords for your accounts. • Choose a combination of letters ,numbers and symbols to make a unique password.
  • 24. HOW TO SECURE OUR DATA? 1  i or l 3  e 4  a +  t 9  g 0  o $  s |  i or l |/|  M ||  N s  z c  c f  ph Ph  f x  ks ks  x
  • 25. ADVANTAGES OF HACKING Hacking is quite useful in the following scenarios : 1.To recover lost information, especially in case you lost your password. 2.To perform penetration testing to strengthen computer and network security. 3.To put adequate preventative measures in place to prevent security breaches. 4.To have a computer system that prevents malicious hackers from gaining access.
  • 26. DISADVANTAGES OF HACKING • Hacking is quite dangerous if it is done with harmful intent. It can cause − 1. Massive security breach. 2. Unauthorized system access on private information. 3. Privacy violation. 4. Hampering system operation. 5. Denial of service attacks. 6. Malicious attack on the system.
  • 27. CONCLUSION • Keep your password protected. Your password should be combination of characters , digits, special symbols. Do not respond to fake or phishing Email. Whenever you do any online transaction always keep watch on site whether the protocol of site is “https” and whether it has a lock Symbol or not.