SlideShare uma empresa Scribd logo
1 de 20
WELCOME
PRESENTED BY:NIHSA PARIYAR
CONTENT
-History of hacking
-What is hacking?
-Who are hackers?
-Types of hacking.
-Types of hacker.
-What should we do after being hacked?
-How to secure our data?
-Advantage /Disadvantage of hacking
-Conclusion
-References
HISTORY OF HACKING
 Hacking has been a part of computing for about fifty
years.
 Hacking was first begun in 1960s at
MIT(Massachusetts Institute of Technology) origin of
the term ‘Hacker’
 The hackers have thirst of knowledge from the
beginning.
 Boredom is an never an object of challenge for the
hacker.
What is Hacking?
Hacking is identifying weakness in
computer systems or network to
gain unauthorized access.
WHO ARE HACKERS?
 In computer security context a hacker is one who
seeks and exploits weakness in computer system or in
computer network. They broke computer programs
also named as crackers.
TYPES OF HACKING.
 Website hacking
 Network hacking
 Ethical hacking
 Email hacking
 Password hacking
 Online banking hacking
 Computer hacking
WEBSITE HACKING
 Hacking a website means taking control from the web
site owner to a person who hack.
NETWORK HACKING
 Network Hacking is gathering information about domain
by using tools like Netstat , arcp ,ping etc.
ETHICAL HACKING
 Ethical hacking means to find weakness in computer
system to resolve the problem by individual or by any
organization .
EMAIL HACKING and PASSWORD
HACKING.
Email hacking means illegally
get access to any email account.
And get password from data.
ONLINE BANKING HACKING
To get unauthorized access to bank
account without the person’s
permission.
COMPUTER HACKING
To know about your files folders
with out your permission on your
data storage system.
TYPES OF HACKER
 ETHICAL HACKERS(WHITE HAT)
A hacker who gains access to systems with a view to fix
the identified weakness.
 CRACKERS(BLACK HAT)
The person who gains unauthorized access to computer
system for their own benefit.
 GREY HAT:
The hackers who is in between ethical and black hat.
•SCRIPT KIDDERS
Any non skilled person who gains access to computer
system using already made tools.
 PHREAKERS:
The person who identifies and exploits weakness in
telephone rather than in computer.
WHAT SHOULD WE DO AFTER BEING HACKED AND HOW
CAN WE SECURE OUR DATA?
 Shut down the system or turn off the system.
 Separate the system from network.
 Restore the system with the backup or reinstall the
program.
 It is better to call the police.
YES ! We can secure our data.
 Use difficult passwords .
 Update your OS frequently rather than automatically.
 Download up to date security programs including anti
virus and anti malware software .
 Do not use open WIFI networks it makes hackers easy
to steal and download illegal files.
 Do not use same password for all types of data.
 Come up with new and creative answer for your
security questions.
 Don’t link your accounts.
ADVANTAGES and DISADVANTAGES
OF HCKING
ADVANTAGES.
 Can be used to recover lost information in case of lost
of password.
 Tells you that no technologies are 100%secure.
 Tests how good your computer system is?
 They called it white hat computer hacking.
DISADVANTAGES
 Some people use for their own benefit.
 Its illegal to steal others private information.
FINAL QUESTION
ARE HACKERS REALLY
BAD GUYS?
ANSWER IS
NO!
CONCLUSION
 Keep your passwords protected. Include digits,
characters ,special type of symbols etc. do not respond
to any fishing emails .When you are doing any online
transaction always check weather the protocol of site
has lock symbol or not.
REFRENCES
 www.guru99.com
 www.shareslide.com
 www.ted.org
THANK YOU

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Password Attack
Password Attack Password Attack
Password Attack
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Hacking
Hacking Hacking
Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 

Semelhante a Hacking

CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 

Semelhante a Hacking (20)

Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Hacking

  • 2. CONTENT -History of hacking -What is hacking? -Who are hackers? -Types of hacking. -Types of hacker. -What should we do after being hacked? -How to secure our data? -Advantage /Disadvantage of hacking -Conclusion -References
  • 3. HISTORY OF HACKING  Hacking has been a part of computing for about fifty years.  Hacking was first begun in 1960s at MIT(Massachusetts Institute of Technology) origin of the term ‘Hacker’  The hackers have thirst of knowledge from the beginning.  Boredom is an never an object of challenge for the hacker.
  • 4. What is Hacking? Hacking is identifying weakness in computer systems or network to gain unauthorized access.
  • 5. WHO ARE HACKERS?  In computer security context a hacker is one who seeks and exploits weakness in computer system or in computer network. They broke computer programs also named as crackers.
  • 6. TYPES OF HACKING.  Website hacking  Network hacking  Ethical hacking  Email hacking  Password hacking  Online banking hacking  Computer hacking
  • 7. WEBSITE HACKING  Hacking a website means taking control from the web site owner to a person who hack. NETWORK HACKING  Network Hacking is gathering information about domain by using tools like Netstat , arcp ,ping etc. ETHICAL HACKING  Ethical hacking means to find weakness in computer system to resolve the problem by individual or by any organization .
  • 8. EMAIL HACKING and PASSWORD HACKING. Email hacking means illegally get access to any email account. And get password from data.
  • 9. ONLINE BANKING HACKING To get unauthorized access to bank account without the person’s permission.
  • 10. COMPUTER HACKING To know about your files folders with out your permission on your data storage system.
  • 11. TYPES OF HACKER  ETHICAL HACKERS(WHITE HAT) A hacker who gains access to systems with a view to fix the identified weakness.  CRACKERS(BLACK HAT) The person who gains unauthorized access to computer system for their own benefit.  GREY HAT: The hackers who is in between ethical and black hat.
  • 12. •SCRIPT KIDDERS Any non skilled person who gains access to computer system using already made tools.  PHREAKERS: The person who identifies and exploits weakness in telephone rather than in computer.
  • 13. WHAT SHOULD WE DO AFTER BEING HACKED AND HOW CAN WE SECURE OUR DATA?  Shut down the system or turn off the system.  Separate the system from network.  Restore the system with the backup or reinstall the program.  It is better to call the police.
  • 14. YES ! We can secure our data.  Use difficult passwords .  Update your OS frequently rather than automatically.  Download up to date security programs including anti virus and anti malware software .  Do not use open WIFI networks it makes hackers easy to steal and download illegal files.  Do not use same password for all types of data.  Come up with new and creative answer for your security questions.  Don’t link your accounts.
  • 15. ADVANTAGES and DISADVANTAGES OF HCKING ADVANTAGES.  Can be used to recover lost information in case of lost of password.  Tells you that no technologies are 100%secure.  Tests how good your computer system is?  They called it white hat computer hacking. DISADVANTAGES  Some people use for their own benefit.  Its illegal to steal others private information.
  • 16. FINAL QUESTION ARE HACKERS REALLY BAD GUYS?
  • 18. CONCLUSION  Keep your passwords protected. Include digits, characters ,special type of symbols etc. do not respond to any fishing emails .When you are doing any online transaction always check weather the protocol of site has lock symbol or not.