2. 1. Introduction
2. General Hacking Methods
3. Why do Hackers Hack
4. Negative Effects of Hackers
5. Losses Due to Hackers
6. History of Hackers
7. Top 10 Countries with most Hackers
8. Missuse of Hacking Technology
3. What is Hacking ?
1.Hacking refers to
the activities which
are done to intrude
some one else’s
personal information
so as to use it for
malicious, unwanted
purposes.
2. Hacking is a term which refers to the activities aimed
at exploiting security flaws to obtain personal information
for gaining access to secured networks.
4. A typical attacker works in the following manner:
Identify the target system.
Gathering Information on the target system.
Finding a possible loophole in the target system.
Exploiting this loophole using exploit code.
Removing all traces from the log files and escaping without a trace.
5. When someone hacks a computer or
network system, it's typically for one of
the following reasons:
1. Credit Card Information(for money)
In recent years it has become increasingly possible for
hackers to steal credit card information. With online
shopping and online banking becoming more prevalent, the
opportunity for a skilled hacker to acquire credit card
information continues to grow.
6. 2. Identity Theft
Hackers can potentially steal
identity by simply hacking into a
computer. With a stolen identity,
a hacker can do almost everything.
3. Business Information
In the modern world it is not at all uncommon for incredibly
important business information to be stored on computers.
Hackers can steal financial information, account numbers,
and even client information.
4. Egotism
Some hackers hack computers solely to prove that they can.
These individuals may do anything from small-scale hacking
all the way up to full-on identity.
7. 1. FINANCIAL LOSSES
In 2011, Sony lost $170 million due to a
hack of their PlayStation system. Also
in 2011, CitiGroup lost $2.7 million and
AT&T lost $2 million as a result of
hackers.
2. LOSS OF INFORMATION
Hacking often results in a loss of data
due to files being deleted or changed.
leak of top secret information could
cause real-world security issues.
Servers at the Pentagon, FBI, Interpol
and NASA have all been compromised at
various points. various points in the past ten
years.
8. 1. $171 million – Sony
2. $2.7 million – Citigroup
3. $2 million – Stratfor
4. $2 million – AT&T
9. 1980s
- Cyberspacecoined
-414 arrested
-Two hackergroups formed
-2600published
1990s
-NationalCrackdownonhackers
-KevinMitnick arrested
-Microsoft’sNToperating system pierced
10. Late 1990s
Hackers break into and defacefederal Web
sites, including the U.S. Department of Justice,
U.S. Air Force, CIA, NASA and others.
2013,India : Rs 2.4 crore heist by cyber
criminals who hacked into the Mumbai-based
current account of the RPG Group of
companies.
2011 ,Japan: Sony PlayStation Network Hack To
Cost $170 Million.
12. Missuse of Hacking Technology
Degree of
Computer
Crime
Amount of Damage or Harm
Required
Penalty
1st
degree Damage to or the value of the property or
computer services is over $10,000
B felony (up to 20 years in
prison, a fine of up to $15,000,
or both)
2nd
degree Damage to or the value of the property or
computer services is over $5,000
C felony (up to 10 years in
prison, a fine of up to $10,000,
or both)
3rd
degree ● Damage to or the value of the property or
computer services is over $1,000
● Reckless conduct that creates a risk of
serious physical injury to another person
D felony (up to five years in
prison, a fine of up to $5,000, or
both)
4th
degree Damage to or the value of the property or
computer services is over $500
A misdemeanor (up to one year
in prison, a fine of up to $2,000,
or both)
5th
degree Damage to or the value of the property or
computer services, if any, is $500 or less
B misdemeanor (up to six
months in prison, a fine of up to
$1,000, or both)