SlideShare uma empresa Scribd logo
1 de 10
Hacking vs Cracking 
BY 
NARENDRA KUMAR
Contents 
 What is Hacking 
 What is Cracking 
 Objectives of Hacker 
 Objectives of Cracker 
 Difference between Hacking and Cracking 
 Steps to be taken to prevent attacks from Hacking and 
Cracking 
 Conclusion
What is Hacking 
 Hacking is the gaining of access (wanted or unwanted) 
to a computer and viewing, copying or creating data 
without the intention of destroying the data or 
maliciously harming the computer. 
 Hacking is the art of exploitation. 
 Hackers have curiosity on the working of system and 
skilled persons. 
 Hackers are good guys who often doesn’t harm the 
system or cause damage. 
 Generally Hackers are referred as ‘White Hat’ Hackers.
What is Cracking 
 Cracking is the process of gaining unauthorized access 
with the intention of causing damage. 
 The purpose of cracking is to breach or bypass security 
or gain access to software without paying royalties. 
 Cracker is the name given to hackers who gain into 
computers for criminal gain. 
 Crackers are intended to damage the personal data or 
break the security 
 Generally Crackers are referred as ‘Black Hat’ hackers.
Objectives of Hacker 
 Gaining access to the system by authorized or 
unauthorized means. 
 Hackers won’t cause damage to the system or break 
the system, they will view, copy and access the data. 
 Hackers are often hired so as to secure the data by 
detecting vulnerabilities. 
 Hackers modify and add code to the initial software, so 
that it does what it is not intended for.
Objectives of Cracker 
 Gaining access to the system by unauthorized means 
thus breaking the security. 
 Crackers will steal the data, causing damage to the 
system. 
 Crackers steal the data by reverse engineering (using 
the software created by hackers). 
 Crackers break the system by malicious way introducing 
a virus into the system.
Difference between 
Hacking and Cracking 
 Hacking is the legal activity. 
 Cracking is an illegal activity. 
 Hackers make the code. 
 Crackers break the code. 
 Hackers do hacking with the intention of their curiosity 
and to gain knowledge. 
 Crackers hack intentionally for the purpose of earning, 
causing damage to system or break the code.
Steps to be taken to 
prevent attacks from 
Hacking and Cracking 
 Be cautious in sharing data with the unknown websites. 
 Never use unknown public Wi-Fi networks that are free 
and share your personal data by public network. 
 Always use updated Anti-Virus in your system. 
 Never click on spam links that are publishing day to day 
widely in social networks (click jacking). 
 Don’t exchange transactions on non https web pages.
Conclusion 
 Thus, all the Hackers aren’t the Crackers. Hackers won’t 
damage the system and break the code for their 
personal use. Crackers cracks the software's and breaks 
the code. 
 The hackers are mistaken as crackers and bad guys by 
the people in the networking world, actually crackers 
are bad ones. 
 Hacking is the curiosity that made them discover new 
things about the vulnerabilities. 
 Cracking is the purpose of earning and breaking law 
that make them popular among the cyber world but 
remains criminals in cyber crime.

Mais conteúdo relacionado

Mais procurados (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Hacking
HackingHacking
Hacking
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 

Destaque

6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού
6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού
6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιούVasiliki Resvani
 
Adrian paunescu scrisoare din urgenţa inimii
Adrian paunescu   scrisoare din urgenţa inimiiAdrian paunescu   scrisoare din urgenţa inimii
Adrian paunescu scrisoare din urgenţa inimiiBiro Bela
 
Правильное питание, как элемент здорового образа жизни
Правильное питание, как элемент здорового образа жизни Правильное питание, как элемент здорового образа жизни
Правильное питание, как элемент здорового образа жизни rorbic
 
Presentation 141126 om Digital Tentamen
Presentation 141126 om Digital TentamenPresentation 141126 om Digital Tentamen
Presentation 141126 om Digital TentamenMats Brenner
 
Good Conduct Award Sep2009
Good Conduct Award Sep2009Good Conduct Award Sep2009
Good Conduct Award Sep2009Kyle Waste
 
095 note informative
095   note informative095   note informative
095 note informativeBiro Bela
 
Adrian paunescu ce aveţi netrbnicilor cu aceasta tara
Adrian paunescu   ce aveţi netrbnicilor cu aceasta taraAdrian paunescu   ce aveţi netrbnicilor cu aceasta tara
Adrian paunescu ce aveţi netrbnicilor cu aceasta taraBiro Bela
 
089 profetiile lui sundar singh
089   profetiile lui sundar singh089   profetiile lui sundar singh
089 profetiile lui sundar singhBiro Bela
 
1. класифікація хімічних реакцій. реакції сполучення, розкладу, заміщення, р...
1. класифікація хімічних реакцій.  реакції сполучення, розкладу, заміщення, р...1. класифікація хімічних реакцій.  реакції сполучення, розкладу, заміщення, р...
1. класифікація хімічних реакцій. реакції сполучення, розкладу, заміщення, р...oksanachernish
 
104 popoarele lumii cer un singur guvern mondial
104   popoarele lumii cer un singur guvern mondial104   popoarele lumii cer un singur guvern mondial
104 popoarele lumii cer un singur guvern mondialBiro Bela
 
Epic research daily agri report 20 nov 2014
Epic research daily  agri report  20 nov 2014Epic research daily  agri report  20 nov 2014
Epic research daily agri report 20 nov 2014Epic Research Limited
 
Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...
Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...
Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...Primend
 
Lielplatones amatierteātris
Lielplatones amatierteātrisLielplatones amatierteātris
Lielplatones amatierteātrisLaura Gulbe
 
140 dragii mei compatrioti romani
140  dragii mei compatrioti romani140  dragii mei compatrioti romani
140 dragii mei compatrioti romaniBiro Bela
 

Destaque (20)

Array multi dimensi
Array multi dimensiArray multi dimensi
Array multi dimensi
 
6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού
6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού
6ο ΔΗΜΟΤΙΚΟ ΣΧΟΛΕΙΟ ΠΑΤΡΩΝ Τα δικαιώματα του παιδιού
 
Adrian paunescu scrisoare din urgenţa inimii
Adrian paunescu   scrisoare din urgenţa inimiiAdrian paunescu   scrisoare din urgenţa inimii
Adrian paunescu scrisoare din urgenţa inimii
 
043 notes
043   notes043   notes
043 notes
 
Biodiversita muse 05_ricci
Biodiversita muse 05_ricciBiodiversita muse 05_ricci
Biodiversita muse 05_ricci
 
Правильное питание, как элемент здорового образа жизни
Правильное питание, как элемент здорового образа жизни Правильное питание, как элемент здорового образа жизни
Правильное питание, как элемент здорового образа жизни
 
Presentation 141126 om Digital Tentamen
Presentation 141126 om Digital TentamenPresentation 141126 om Digital Tentamen
Presentation 141126 om Digital Tentamen
 
Biodiversita muse 03_cesarini
Biodiversita muse 03_cesariniBiodiversita muse 03_cesarini
Biodiversita muse 03_cesarini
 
Good Conduct Award Sep2009
Good Conduct Award Sep2009Good Conduct Award Sep2009
Good Conduct Award Sep2009
 
Biodiversita muse 06_clauser
Biodiversita muse 06_clauserBiodiversita muse 06_clauser
Biodiversita muse 06_clauser
 
095 note informative
095   note informative095   note informative
095 note informative
 
Adrian paunescu ce aveţi netrbnicilor cu aceasta tara
Adrian paunescu   ce aveţi netrbnicilor cu aceasta taraAdrian paunescu   ce aveţi netrbnicilor cu aceasta tara
Adrian paunescu ce aveţi netrbnicilor cu aceasta tara
 
089 profetiile lui sundar singh
089   profetiile lui sundar singh089   profetiile lui sundar singh
089 profetiile lui sundar singh
 
1. класифікація хімічних реакцій. реакції сполучення, розкладу, заміщення, р...
1. класифікація хімічних реакцій.  реакції сполучення, розкладу, заміщення, р...1. класифікація хімічних реакцій.  реакції сполучення, розкладу, заміщення, р...
1. класифікація хімічних реакцій. реакції сполучення, розкладу, заміщення, р...
 
104 popoarele lumii cer un singur guvern mondial
104   popoarele lumii cer un singur guvern mondial104   popoarele lumii cer un singur guvern mondial
104 popoarele lumii cer un singur guvern mondial
 
Epic research daily agri report 20 nov 2014
Epic research daily  agri report  20 nov 2014Epic research daily  agri report  20 nov 2014
Epic research daily agri report 20 nov 2014
 
Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...
Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...
Primend praktiline pilveseminar 2014 - IT teenuste visioon serverikeskusest p...
 
Desain grafis multimedia
Desain grafis multimediaDesain grafis multimedia
Desain grafis multimedia
 
Lielplatones amatierteātris
Lielplatones amatierteātrisLielplatones amatierteātris
Lielplatones amatierteātris
 
140 dragii mei compatrioti romani
140  dragii mei compatrioti romani140  dragii mei compatrioti romani
140 dragii mei compatrioti romani
 

Semelhante a Hacking vs cracking

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackersbalti13
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking OverviewSubhoneel Datta
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 

Semelhante a Hacking vs cracking (20)

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
HACKING
HACKINGHACKING
HACKING
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 

Último

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 

Último (20)

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 

Hacking vs cracking

  • 1. Hacking vs Cracking BY NARENDRA KUMAR
  • 2. Contents  What is Hacking  What is Cracking  Objectives of Hacker  Objectives of Cracker  Difference between Hacking and Cracking  Steps to be taken to prevent attacks from Hacking and Cracking  Conclusion
  • 3. What is Hacking  Hacking is the gaining of access (wanted or unwanted) to a computer and viewing, copying or creating data without the intention of destroying the data or maliciously harming the computer.  Hacking is the art of exploitation.  Hackers have curiosity on the working of system and skilled persons.  Hackers are good guys who often doesn’t harm the system or cause damage.  Generally Hackers are referred as ‘White Hat’ Hackers.
  • 4. What is Cracking  Cracking is the process of gaining unauthorized access with the intention of causing damage.  The purpose of cracking is to breach or bypass security or gain access to software without paying royalties.  Cracker is the name given to hackers who gain into computers for criminal gain.  Crackers are intended to damage the personal data or break the security  Generally Crackers are referred as ‘Black Hat’ hackers.
  • 5. Objectives of Hacker  Gaining access to the system by authorized or unauthorized means.  Hackers won’t cause damage to the system or break the system, they will view, copy and access the data.  Hackers are often hired so as to secure the data by detecting vulnerabilities.  Hackers modify and add code to the initial software, so that it does what it is not intended for.
  • 6. Objectives of Cracker  Gaining access to the system by unauthorized means thus breaking the security.  Crackers will steal the data, causing damage to the system.  Crackers steal the data by reverse engineering (using the software created by hackers).  Crackers break the system by malicious way introducing a virus into the system.
  • 7. Difference between Hacking and Cracking  Hacking is the legal activity.  Cracking is an illegal activity.  Hackers make the code.  Crackers break the code.  Hackers do hacking with the intention of their curiosity and to gain knowledge.  Crackers hack intentionally for the purpose of earning, causing damage to system or break the code.
  • 8.
  • 9. Steps to be taken to prevent attacks from Hacking and Cracking  Be cautious in sharing data with the unknown websites.  Never use unknown public Wi-Fi networks that are free and share your personal data by public network.  Always use updated Anti-Virus in your system.  Never click on spam links that are publishing day to day widely in social networks (click jacking).  Don’t exchange transactions on non https web pages.
  • 10. Conclusion  Thus, all the Hackers aren’t the Crackers. Hackers won’t damage the system and break the code for their personal use. Crackers cracks the software's and breaks the code.  The hackers are mistaken as crackers and bad guys by the people in the networking world, actually crackers are bad ones.  Hacking is the curiosity that made them discover new things about the vulnerabilities.  Cracking is the purpose of earning and breaking law that make them popular among the cyber world but remains criminals in cyber crime.