SlideShare une entreprise Scribd logo
1  sur  11
HACKING ! Present By : Afi ezairy bin zainudin
what is hacker??? * Hacker  is a term applied often to  computer software  or  computer hardware   programmers * Hacker  is also someone who modifies electronics
Categories of hacker ! * Hacker: Highly skilled programmer * Hacker: Computer and network security expert * Hacker: Hardware modifier
Hacker: Highly skilled programmer * This mainly positive usage of  hacker  refers to one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly.
Hacker:  Computer and  network security expert * Hacker  is one who specializes in working with computers and  network  systems  Confidentiality, Integrity, and Access .
Hacker:  Hardware modifier * Hacker is someone who modifies electronics, for  example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance.
Ways  to Minimize  Potential for Hacking! in school * Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff.  * Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.
Hacking Tools  and Denial of Service Basics  1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans  6. Viruses
Hacking Tools  and Denial of Service Basics  1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans  6. Viruses
Hacking software!
conclusion ,[object Object]

Contenu connexe

Tendances

SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
Afna Crcs
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
kent neri
 

Tendances (20)

Computer network
Computer networkComputer network
Computer network
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer security
Computer securityComputer security
Computer security
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
cyber security
cyber securitycyber security
cyber security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Cyber security
Cyber securityCyber security
Cyber security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Hackers
HackersHackers
Hackers
 

En vedette

CARA BOBOL ROUTER WIFI ID
CARA BOBOL ROUTER WIFI IDCARA BOBOL ROUTER WIFI ID
CARA BOBOL ROUTER WIFI ID
Ivul Varel Fu
 
OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)
grugq
 
12 jenis kerusakan laptop dan cara memperbaikinya
12 jenis kerusakan laptop dan cara memperbaikinya12 jenis kerusakan laptop dan cara memperbaikinya
12 jenis kerusakan laptop dan cara memperbaikinya
Yantho Lase
 
Buku bahasa pemrograman lengkap
Buku bahasa pemrograman lengkapBuku bahasa pemrograman lengkap
Buku bahasa pemrograman lengkap
Deni Maulana
 
Buku sakti cyber security (bestpoin)
Buku sakti cyber security (bestpoin)Buku sakti cyber security (bestpoin)
Buku sakti cyber security (bestpoin)
ASIM WIGUNA
 

En vedette (20)

Full Buku sakti belajar hacker
Full Buku sakti belajar hackerFull Buku sakti belajar hacker
Full Buku sakti belajar hacker
 
CARA BOBOL ROUTER WIFI ID
CARA BOBOL ROUTER WIFI IDCARA BOBOL ROUTER WIFI ID
CARA BOBOL ROUTER WIFI ID
 
Buku Sakti Hacker
Buku Sakti HackerBuku Sakti Hacker
Buku Sakti Hacker
 
OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)
 
Menampilkan SSID yang tersembunyi
Menampilkan SSID yang tersembunyiMenampilkan SSID yang tersembunyi
Menampilkan SSID yang tersembunyi
 
10 Langkah Awal Menjadi Seorang Ahli Komputer
10 Langkah Awal Menjadi Seorang Ahli Komputer10 Langkah Awal Menjadi Seorang Ahli Komputer
10 Langkah Awal Menjadi Seorang Ahli Komputer
 
On Cyber
On Cyber  On Cyber
On Cyber
 
Cara menampilkan hidden ssid
Cara menampilkan hidden ssidCara menampilkan hidden ssid
Cara menampilkan hidden ssid
 
12 jenis kerusakan laptop dan cara memperbaikinya
12 jenis kerusakan laptop dan cara memperbaikinya12 jenis kerusakan laptop dan cara memperbaikinya
12 jenis kerusakan laptop dan cara memperbaikinya
 
Cara mengetahui ssid yang hiddden fadril
Cara mengetahui ssid yang hiddden fadrilCara mengetahui ssid yang hiddden fadril
Cara mengetahui ssid yang hiddden fadril
 
Cara mengkoneksikan wireless ke hidden ssid di windows
Cara mengkoneksikan wireless ke hidden ssid di windowsCara mengkoneksikan wireless ke hidden ssid di windows
Cara mengkoneksikan wireless ke hidden ssid di windows
 
Buku bahasa pemrograman lengkap
Buku bahasa pemrograman lengkapBuku bahasa pemrograman lengkap
Buku bahasa pemrograman lengkap
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Hack Harvard 2012: Open Source is Big Business
Hack Harvard 2012: Open Source is Big BusinessHack Harvard 2012: Open Source is Big Business
Hack Harvard 2012: Open Source is Big Business
 
Hack & Fix, Hands on ColdFusion Security Training
Hack & Fix, Hands on ColdFusion Security TrainingHack & Fix, Hands on ColdFusion Security Training
Hack & Fix, Hands on ColdFusion Security Training
 
Buku sakti cyber security (bestpoin)
Buku sakti cyber security (bestpoin)Buku sakti cyber security (bestpoin)
Buku sakti cyber security (bestpoin)
 
Cara memasukan file dari slideshare ke blog
Cara memasukan file dari slideshare ke blogCara memasukan file dari slideshare ke blog
Cara memasukan file dari slideshare ke blog
 
Perintah dasarlinux norestriction
Perintah dasarlinux norestrictionPerintah dasarlinux norestriction
Perintah dasarlinux norestriction
 
Mengembalikan data yang terhapus atau rusak pada hardisk menggunakan ubuntu
Mengembalikan data yang terhapus atau rusak pada hardisk menggunakan ubuntuMengembalikan data yang terhapus atau rusak pada hardisk menggunakan ubuntu
Mengembalikan data yang terhapus atau rusak pada hardisk menggunakan ubuntu
 
Cara share printer dalam network pada windows 7
Cara  share printer dalam network  pada windows 7Cara  share printer dalam network  pada windows 7
Cara share printer dalam network pada windows 7
 

Similaire à Hacker

Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
ANUSREEASHOK5
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 

Similaire à Hacker (20)

Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Hacker

  • 1. HACKING ! Present By : Afi ezairy bin zainudin
  • 2. what is hacker??? * Hacker is a term applied often to computer software or computer hardware programmers * Hacker is also someone who modifies electronics
  • 3. Categories of hacker ! * Hacker: Highly skilled programmer * Hacker: Computer and network security expert * Hacker: Hardware modifier
  • 4. Hacker: Highly skilled programmer * This mainly positive usage of hacker refers to one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly.
  • 5. Hacker: Computer and network security expert * Hacker is one who specializes in working with computers and network systems Confidentiality, Integrity, and Access .
  • 6. Hacker: Hardware modifier * Hacker is someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance.
  • 7. Ways to Minimize Potential for Hacking! in school * Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff. * Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.
  • 8. Hacking Tools and Denial of Service Basics 1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans 6. Viruses
  • 9. Hacking Tools and Denial of Service Basics 1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans 6. Viruses
  • 11.