This document provides an overview of hacking, including its history, definitions, types, and how to secure data. It discusses how hacking began in the 1960s at MIT and explores ethical hacking versus black hat hacking. The document outlines various types of hacking like website, network, and password hacking. It provides tips for securing data, such as using strong passwords and updating security software. Both advantages and disadvantages of hacking are mentioned. The document concludes that not all hackers are bad and security should remain a top priority.
2. CONTENT
-History of hacking
-What is hacking?
-Who are hackers?
-Types of hacking.
-Types of hacker.
-What should we do after being hacked?
-How to secure our data?
-Advantage /Disadvantage of hacking
-Conclusion
-References
3. HISTORY OF HACKING
Hacking has been a part of computing for about fifty
years.
Hacking was first begun in 1960s at
MIT(Massachusetts Institute of Technology) origin of
the term ‘Hacker’
The hackers have thirst of knowledge from the
beginning.
Boredom is an never an object of challenge for the
hacker.
4. What is Hacking?
Hacking is identifying weakness in
computer systems or network to
gain unauthorized access.
5. WHO ARE HACKERS?
In computer security context a hacker is one who
seeks and exploits weakness in computer system or in
computer network. They broke computer programs
also named as crackers.
7. WEBSITE HACKING
Hacking a website means taking control from the web
site owner to a person who hack.
NETWORK HACKING
Network Hacking is gathering information about domain
by using tools like Netstat , arcp ,ping etc.
ETHICAL HACKING
Ethical hacking means to find weakness in computer
system to resolve the problem by individual or by any
organization .
8. EMAIL HACKING and PASSWORD
HACKING.
Email hacking means illegally
get access to any email account.
And get password from data.
10. COMPUTER HACKING
To know about your files folders
with out your permission on your
data storage system.
11. TYPES OF HACKER
ETHICAL HACKERS(WHITE HAT)
A hacker who gains access to systems with a view to fix
the identified weakness.
CRACKERS(BLACK HAT)
The person who gains unauthorized access to computer
system for their own benefit.
GREY HAT:
The hackers who is in between ethical and black hat.
12. •SCRIPT KIDDERS
Any non skilled person who gains access to computer
system using already made tools.
PHREAKERS:
The person who identifies and exploits weakness in
telephone rather than in computer.
13. WHAT SHOULD WE DO AFTER BEING HACKED AND HOW
CAN WE SECURE OUR DATA?
Shut down the system or turn off the system.
Separate the system from network.
Restore the system with the backup or reinstall the
program.
It is better to call the police.
14. YES ! We can secure our data.
Use difficult passwords .
Update your OS frequently rather than automatically.
Download up to date security programs including anti
virus and anti malware software .
Do not use open WIFI networks it makes hackers easy
to steal and download illegal files.
Do not use same password for all types of data.
Come up with new and creative answer for your
security questions.
Don’t link your accounts.
15. ADVANTAGES and DISADVANTAGES
OF HCKING
ADVANTAGES.
Can be used to recover lost information in case of lost
of password.
Tells you that no technologies are 100%secure.
Tests how good your computer system is?
They called it white hat computer hacking.
DISADVANTAGES
Some people use for their own benefit.
Its illegal to steal others private information.
18. CONCLUSION
Keep your passwords protected. Include digits,
characters ,special type of symbols etc. do not respond
to any fishing emails .When you are doing any online
transaction always check weather the protocol of site
has lock symbol or not.