SlideShare une entreprise Scribd logo
1  sur  14
Hacking
MADE BY : NAVEEN NAKKA
ROLL NO. : 13765A1007
CLASS: 3rd
YEAR
1. Introduction
2. General Hacking Methods
3. Why do Hackers Hack
4. Negative Effects of Hackers
5. Losses Due to Hackers
6. History of Hackers
7. Top 10 Countries with most Hackers
8. Missuse of Hacking Technology
What is Hacking ?
1.Hacking refers to
the activities which
are done to intrude
some one else’s
personal information
so as to use it for
malicious, unwanted
purposes.
2. Hacking is a term which refers to the activities aimed
at exploiting security flaws to obtain personal information
for gaining access to secured networks.
A typical attacker works in the following manner:
Identify the target system.
Gathering Information on the target system.
Finding a possible loophole in the target system.
Exploiting this loophole using exploit code.
Removing all traces from the log files and escaping without a trace.
When someone hacks a computer or
network system, it's typically for one of
the following reasons:
1. Credit Card Information(for money)
In recent years it has become increasingly possible for
hackers to steal credit card information. With online
shopping and online banking becoming more prevalent, the
opportunity for a skilled hacker to acquire credit card
information continues to grow.
2. Identity Theft
Hackers can potentially steal
identity by simply hacking into a
computer. With a stolen identity,
a hacker can do almost everything.
3. Business Information
In the modern world it is not at all uncommon for incredibly
important business information to be stored on computers.
Hackers can steal financial information, account numbers,
and even client information.
4. Egotism
Some hackers hack computers solely to prove that they can.
These individuals may do anything from small-scale hacking
all the way up to full-on identity.
1. FINANCIAL LOSSES
In 2011, Sony lost $170 million due to a
hack of their PlayStation system. Also
in 2011, CitiGroup lost $2.7 million and
AT&T lost $2 million as a result of
hackers.
2. LOSS OF INFORMATION
Hacking often results in a loss of data
due to files being deleted or changed.
leak of top secret information could
cause real-world security issues.
Servers at the Pentagon, FBI, Interpol
and NASA have all been compromised at
various points. various points in the past ten
years.
1. $171 million – Sony
2. $2.7 million – Citigroup
3. $2 million – Stratfor
4. $2 million – AT&T
 1980s
- Cyberspacecoined
-414 arrested
-Two hackergroups formed
-2600published
 1990s
-NationalCrackdownonhackers
-KevinMitnick arrested
-Microsoft’sNToperating system pierced
Late 1990s
Hackers break into and defacefederal Web
sites, including the U.S. Department of Justice,
U.S. Air Force, CIA, NASA and others.
2013,India : Rs 2.4 crore heist by cyber
criminals who hacked into the Mumbai-based
current account of the RPG Group of
companies.
2011 ,Japan: Sony PlayStation Network Hack To
Cost $170 Million.
1.USA
2.China
3.Turkey
4.Russia
5.Taiwan
6.Brazil
7.Romania
8.India
9.Italy
10.Hungary
Missuse of Hacking Technology
Degree of
Computer
Crime
Amount of Damage or Harm
Required
Penalty
1st
 degree Damage to or the value of the property or
computer services is over $10,000
B felony (up to 20 years in
prison, a fine of up to $15,000,
or both)
2nd
 degree Damage to or the value of the property or
computer services is over $5,000
C felony (up to 10 years in
prison, a fine of up to $10,000,
or both)
3rd
 degree ● Damage to or the value of the property or
computer services is over $1,000
● Reckless conduct that creates a risk of
serious physical injury to another person
D felony (up to five years in
prison, a fine of up to $5,000, or
both)
4th
 degree Damage to or the value of the property or
computer services is over $500
A misdemeanor (up to one year
in prison, a fine of up to $2,000,
or both)
5th
 degree Damage to or the value of the property or
computer services, if any, is $500 or less
B misdemeanor (up to six
months in prison, a fine of up to
$1,000, or both)
Thank you
Thanks for your attention…!!!
Any Queries ??

Contenu connexe

Tendances (20)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
HACKING
HACKINGHACKING
HACKING
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

En vedette

Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in TeluguSravani Reddy
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialYam Peleg
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyYusuf Shaik
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Sauraha presentation
Sauraha presentationSauraha presentation
Sauraha presentationedmnepal
 
power line networking by ajay dilish
power line networking by ajay dilishpower line networking by ajay dilish
power line networking by ajay dilishAjay Dilish
 
Travel hacking presentation
Travel hacking presentationTravel hacking presentation
Travel hacking presentationAaron Wong
 
New microsoft office power point presentation copy
New microsoft office power point presentation   copyNew microsoft office power point presentation   copy
New microsoft office power point presentation copykor
 
Wildlife conservation
Wildlife conservationWildlife conservation
Wildlife conservationHarsh Kalode
 
Mangalam college
Mangalam collegeMangalam college
Mangalam collegeponnu1
 
Presentation on "Dell Corporation"
Presentation on "Dell Corporation"Presentation on "Dell Corporation"
Presentation on "Dell Corporation"Rafiqul Alam Khan
 
Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop) Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop) Sudhanshu Purohit
 

En vedette (20)

Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
5g presentation
5g presentation5g presentation
5g presentation
 
all india radio ppt
all india radio pptall india radio ppt
all india radio ppt
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Sauraha presentation
Sauraha presentationSauraha presentation
Sauraha presentation
 
power line networking by ajay dilish
power line networking by ajay dilishpower line networking by ajay dilish
power line networking by ajay dilish
 
Travel hacking presentation
Travel hacking presentationTravel hacking presentation
Travel hacking presentation
 
Laxman radio PPT
Laxman radio PPTLaxman radio PPT
Laxman radio PPT
 
New microsoft office power point presentation copy
New microsoft office power point presentation   copyNew microsoft office power point presentation   copy
New microsoft office power point presentation copy
 
Wildlife conservation
Wildlife conservationWildlife conservation
Wildlife conservation
 
Mangalam college
Mangalam collegeMangalam college
Mangalam college
 
Presentation on "Dell Corporation"
Presentation on "Dell Corporation"Presentation on "Dell Corporation"
Presentation on "Dell Corporation"
 
Stealth tech
Stealth techStealth tech
Stealth tech
 
presentppt
presentpptpresentppt
presentppt
 
Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop) Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop)
 

Similaire à Hacking presentation BASIC

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptxsagarpanthee
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Hacking
HackingHacking
HackingVirus
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 

Similaire à Hacking presentation BASIC (20)

Hack
HackHack
Hack
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Network security
Network securityNetwork security
Network security
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 

Dernier

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Dernier (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

Hacking presentation BASIC

  • 1. Hacking MADE BY : NAVEEN NAKKA ROLL NO. : 13765A1007 CLASS: 3rd YEAR
  • 2. 1. Introduction 2. General Hacking Methods 3. Why do Hackers Hack 4. Negative Effects of Hackers 5. Losses Due to Hackers 6. History of Hackers 7. Top 10 Countries with most Hackers 8. Missuse of Hacking Technology
  • 3. What is Hacking ? 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks.
  • 4. A typical attacker works in the following manner: Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
  • 5. When someone hacks a computer or network system, it's typically for one of the following reasons: 1. Credit Card Information(for money) In recent years it has become increasingly possible for hackers to steal credit card information. With online shopping and online banking becoming more prevalent, the opportunity for a skilled hacker to acquire credit card information continues to grow.
  • 6. 2. Identity Theft Hackers can potentially steal identity by simply hacking into a computer. With a stolen identity, a hacker can do almost everything. 3. Business Information In the modern world it is not at all uncommon for incredibly important business information to be stored on computers. Hackers can steal financial information, account numbers, and even client information. 4. Egotism Some hackers hack computers solely to prove that they can. These individuals may do anything from small-scale hacking all the way up to full-on identity.
  • 7. 1. FINANCIAL LOSSES In 2011, Sony lost $170 million due to a hack of their PlayStation system. Also in 2011, CitiGroup lost $2.7 million and AT&T lost $2 million as a result of hackers. 2. LOSS OF INFORMATION Hacking often results in a loss of data due to files being deleted or changed. leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points. various points in the past ten years.
  • 8. 1. $171 million – Sony 2. $2.7 million – Citigroup 3. $2 million – Stratfor 4. $2 million – AT&T
  • 9.  1980s - Cyberspacecoined -414 arrested -Two hackergroups formed -2600published  1990s -NationalCrackdownonhackers -KevinMitnick arrested -Microsoft’sNToperating system pierced
  • 10. Late 1990s Hackers break into and defacefederal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. 2013,India : Rs 2.4 crore heist by cyber criminals who hacked into the Mumbai-based current account of the RPG Group of companies. 2011 ,Japan: Sony PlayStation Network Hack To Cost $170 Million.
  • 12. Missuse of Hacking Technology Degree of Computer Crime Amount of Damage or Harm Required Penalty 1st  degree Damage to or the value of the property or computer services is over $10,000 B felony (up to 20 years in prison, a fine of up to $15,000, or both) 2nd  degree Damage to or the value of the property or computer services is over $5,000 C felony (up to 10 years in prison, a fine of up to $10,000, or both) 3rd  degree ● Damage to or the value of the property or computer services is over $1,000 ● Reckless conduct that creates a risk of serious physical injury to another person D felony (up to five years in prison, a fine of up to $5,000, or both) 4th  degree Damage to or the value of the property or computer services is over $500 A misdemeanor (up to one year in prison, a fine of up to $2,000, or both) 5th  degree Damage to or the value of the property or computer services, if any, is $500 or less B misdemeanor (up to six months in prison, a fine of up to $1,000, or both)
  • 14. Thanks for your attention…!!! Any Queries ??