SlideShare uma empresa Scribd logo
1 de 29
HACKING (CRIME) 
If we can defeat them sitting at 
home……who needs to fight with tanks 
and guns!!!! 
Presented By 
Farkhanda Kiran.
INTRODUCTION 
The internet is growing rapidly. It has given rise to 
new opportunities in every field we can think of be it 
entertainment, business, sports or education. 
There’re two sides to a coin. Internet also has it’s 
own disadvantages is Cyber crime- illegal activity 
committed on the internet.
DEFINING CYBER CRIME 
 Crime committed using a computer and the 
internet to steal data or information. 
 Illegal imports. 
 Malicious programs.
Cyber crime 
is nothing but where 
the computer used as an object 
or subject of crime..
TYPES OF CYBER CRIME 
• Hacking 
• Denial of service attack 
• Virus Dissemination 
• Computer Vandalism 
• Cyber Terrorism 
• Software Piracy
HACKING 
• To gain illegal or unauthorized access to a 
file, computer, or network
HISTORY 
• Phase 1: early 1960s to 1970s 
– It was a positive term introduce by MIT 
– A "hacker" was a creative programmer 
who wrote elegant or clever code 
– A "hack" was an especially clever piece 
of code
HISTORY 
• Phase 2: 1970s to mid 1990s 
Phone Phreaker or Phone Hacker
HISTORY 
• Phase 3: beginning with the mid 1990s 
Phreaks started to migrate to computers 
-Political hacking (Hacktivism) surfaced 
– Denial-of-service (DoS) 
– Large scale theft of personal and 
financial information
Who is a “HACKER” ?
HACKER 
• who access computer system and 
network without authorization.
Types of Hackers
1. Black Hat hackers always do illegal work. They 
Work for black money . 
2. Hack into to Bank Websites , credit card 
websites and stole Money from accounts in 
bank websites. 
3. They use their knowledge for illegal purposes.
•White hat hackers are like Ethical Hackers . 
They use their skills for good purposes 
•They work for organizations for stop the 
illegal activities through black hat hackers.
1. Grey Hat hackers have both qualities like 
black hat hackers and white hat hackers . 
2. They use their knowledge for bad 
purposes and good purposes too.
Terminologies 
Hackers 
• Access computer systemornetworkwithoutauthorization 
• Breaks thelaw; cango toprison 
Crackers 
• Break into systems to steal or destroy data 
• U.S.Department of Justice calls both hackers 
Ethical hacker 
• Performs most of the same activities but with owner’s 
permission
Hacktivism
Hacktivism/Political Hacking 
• The act of hacking, or breaking into 
computer system, for a political or socially 
motivated purpose.
The Law: Catching and 
Punishing Hackers: 
• 1986 Congress passed the Computer 
Fraud and Abuse Act (CFAA) 
– Covers government computers, financial and 
medical systems, and activities that involve 
computers in more than one state, including 
computers connected to the Internet 
– The USA Patriot Act expanded the definition of 
loss to include the cost of responding to an 
attack, assessing damage and restoring 
systems
The Law: Catching and 
Punishing Hackers (cont.): 
• A variety of methods for catching 
hackers 
– Law enforcement agents read hacker 
newsletters and participate in chat rooms 
undercover 
– They can often track a handle by looking 
through newsgroup archives 
– Security professionals set up ‘honey pots’ 
which are Web sites that attract hackers, to 
record and study 
– Computer forensics is used to retrieve 
evidence from computers
The Law: Catching and 
Punishing Hackers (cont.): 
• Security 
– Internet started with open access as a means 
of sharing information for research 
– Attitudes about security were slow to catch up 
with the risks 
– Firewalls are used to monitor and filter out 
communication from untrusted sites or that fit a 
profile of suspicious activity 
– Security is often playing catch-up to hackers as 
new vulnerabilities are discovered and 
exploited
The Law: Catching and 
Punishing Hackers (cont.): 
• Responsibility for Security 
– Developers have a responsibility to develop 
with security as a goal 
– Businesses have a responsibility to use 
security tools and monitor their systems to 
prevent attacks from succeeding 
– Home users have a responsibility to ask 
questions and educate themselves on the tools 
to maintain security (personal firewalls, anti-virus 
and anti-spyware)
Conclusion 
• Hacking is a good computing skill that can be used for 
good or bad intention. 
• Hacking does not mean using your computing skills to do 
bad. Society have forgotten the difference between 
crackers and hackers. 
• Learning skills of hacking is only for the greater good.
References 
• http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking. 
htm 
• http://whatishacking.org/ 
• http://whatismyipaddress.com/hacking 
• http://dictionary.reference.com/browse/hacker?s=t 
• http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_crac 
king 
• http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy 
• http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_ 
b_2512573.html 
• http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO 
• http://www.• http://www.Thank cs.berkeley.edu/~bh/hacker.html 
ehow.com/about_4673738_why-do-You 
people-hack.html 
• http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/ 
• http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training 
• http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/
Any **Queries **Ask@Your Own Risk

Mais conteúdo relacionado

Mais procurados

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 

Mais procurados (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking
HackingHacking
Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 

Destaque (10)

Infiniband and Ethernet
Infiniband and EthernetInfiniband and Ethernet
Infiniband and Ethernet
 
Hacking
HackingHacking
Hacking
 
Mary Kay Ash
Mary Kay AshMary Kay Ash
Mary Kay Ash
 
Robocup
RobocupRobocup
Robocup
 
Software Quality Assurance(SQA)
Software Quality Assurance(SQA)Software Quality Assurance(SQA)
Software Quality Assurance(SQA)
 
8086 Architecture
8086 Architecture8086 Architecture
8086 Architecture
 
Optical memory
Optical memoryOptical memory
Optical memory
 
Four Functions Of A Computer
Four Functions Of A ComputerFour Functions Of A Computer
Four Functions Of A Computer
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
 
Functions Of Operating Systems
Functions Of Operating SystemsFunctions Of Operating Systems
Functions Of Operating Systems
 

Semelhante a Hacking

Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxAshwini831102
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 

Semelhante a Hacking (20)

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Hacking
HackingHacking
Hacking
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
hacking
hackinghacking
hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Hacking

  • 1. HACKING (CRIME) If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Farkhanda Kiran.
  • 2. INTRODUCTION The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 3. DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 4. Cyber crime is nothing but where the computer used as an object or subject of crime..
  • 5. TYPES OF CYBER CRIME • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 6.
  • 7. HACKING • To gain illegal or unauthorized access to a file, computer, or network
  • 8. HISTORY • Phase 1: early 1960s to 1970s – It was a positive term introduce by MIT – A "hacker" was a creative programmer who wrote elegant or clever code – A "hack" was an especially clever piece of code
  • 9. HISTORY • Phase 2: 1970s to mid 1990s Phone Phreaker or Phone Hacker
  • 10. HISTORY • Phase 3: beginning with the mid 1990s Phreaks started to migrate to computers -Political hacking (Hacktivism) surfaced – Denial-of-service (DoS) – Large scale theft of personal and financial information
  • 11. Who is a “HACKER” ?
  • 12. HACKER • who access computer system and network without authorization.
  • 14.
  • 15. 1. Black Hat hackers always do illegal work. They Work for black money . 2. Hack into to Bank Websites , credit card websites and stole Money from accounts in bank websites. 3. They use their knowledge for illegal purposes.
  • 16.
  • 17. •White hat hackers are like Ethical Hackers . They use their skills for good purposes •They work for organizations for stop the illegal activities through black hat hackers.
  • 18.
  • 19. 1. Grey Hat hackers have both qualities like black hat hackers and white hat hackers . 2. They use their knowledge for bad purposes and good purposes too.
  • 20. Terminologies Hackers • Access computer systemornetworkwithoutauthorization • Breaks thelaw; cango toprison Crackers • Break into systems to steal or destroy data • U.S.Department of Justice calls both hackers Ethical hacker • Performs most of the same activities but with owner’s permission
  • 22. Hacktivism/Political Hacking • The act of hacking, or breaking into computer system, for a political or socially motivated purpose.
  • 23. The Law: Catching and Punishing Hackers: • 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) – Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet – The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems
  • 24. The Law: Catching and Punishing Hackers (cont.): • A variety of methods for catching hackers – Law enforcement agents read hacker newsletters and participate in chat rooms undercover – They can often track a handle by looking through newsgroup archives – Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study – Computer forensics is used to retrieve evidence from computers
  • 25. The Law: Catching and Punishing Hackers (cont.): • Security – Internet started with open access as a means of sharing information for research – Attitudes about security were slow to catch up with the risks – Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity – Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited
  • 26. The Law: Catching and Punishing Hackers (cont.): • Responsibility for Security – Developers have a responsibility to develop with security as a goal – Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding – Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)
  • 27. Conclusion • Hacking is a good computing skill that can be used for good or bad intention. • Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between crackers and hackers. • Learning skills of hacking is only for the greater good.
  • 28. References • http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking. htm • http://whatishacking.org/ • http://whatismyipaddress.com/hacking • http://dictionary.reference.com/browse/hacker?s=t • http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_crac king • http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy • http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_ b_2512573.html • http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO • http://www.• http://www.Thank cs.berkeley.edu/~bh/hacker.html ehow.com/about_4673738_why-do-You people-hack.html • http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/ • http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training • http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/