O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Hacking And Virus.pptx

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Carregando em…3
×

Confira estes a seguir

1 de 15 Anúncio

Mais Conteúdo rRelacionado

Mais recentes (20)

Anúncio

Hacking And Virus.pptx

  1. 1. - YASH PISE - AIML Hacking And Virus spreading
  2. 2. What is hacking? ● Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge..
  3. 3. Types of HACKER…! a) .Social Engineers b) Biohacker c) Crackers d) Phreakers e) Growth Hacker
  4. 4. 1.Social Engineers – These hackers don’t rely on gizmos or years of programming knowledge to break into computer systems, yet they do it all the time. These whiz kids use social skills, good theatrics, and a little bit of detective work to obtain passwords, credit card information, and other devastating intel. Often targeting businesses, they can be a serious threat to be reckoned with, and can even blackmail people with their findings. 2.Biohackers – Biohackers are very rare to come across, but they do exist. These are individuals who work to bend the rules of normal biology and create new gizmos that work to improve the body. A group of biohackers recently made the news when they created a night vision injection for humans to use. 3.Crackers – Not to be misconstrued for the derogative term, crackers actually work to break the keycodes that keep parts of programs unusable or uninstallable. By cracking the software code, the users who download the software no longer have to pay in order to use the software. Cracked software, also known as warez, is released under the idea that software should be free or open sourced. Unfortunately, this is a nightmare for businesses that release software.
  5. 5. 1.Phreakers– While this term may sound like something you’d hear in a rap or EDM song, phreakers are actually hackers who specialize in phones. In the 80’s, phreakers were the ones who could do a DIY wiretap or get free calls on payphones. In modern ages, phreakers are the people who create spyware for smartphones, intercept cellphone signals on baby monitors, or do other similar acts. This form of hacking has intersected with regular computer hacking now. 2.Growth Hackers – This is beginning to become a common name for people who may use (or abuse) certain aspects of the internet in order to grow businesses or get a higher SEO rank. If you choose to enlist the help of a growth hacker, make sure they’re white hat.
  6. 6. KNOWN TYPES HACKER Ethical hacker basically work for good activities WHITE HAT These are both gray as well as black GREY HAT Illegal hacker promotes to bad activities BLACK HAT These are script hackers kids SCRIPT Kiddies
  7. 7. What are things that a hacker can do to me? Sell your information to other parties who will use it for illicit or illegal purposes Hijack your usernames and passwords Daily making purches from your account Steal your money and open credit card and bank accounts in your name PHISHING on social media ETHICAL FUN MONEY ILLEGAL DAILY
  8. 8. VIRUSES . A computer virus is a computer program that can copy itself andinfect a computer without permission or knowledge of the user What is virus..? A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs)
  9. 9. Types of viruses..! An e-mail virus travels as an attachment to e- mail messages worm is a small piece of software that uses computer networks and security holes to replicate itself. A Trojan horse is simply a computer program. The program claims to do one thing Small packets of virus on internet when allowed to our PC Mail virus worms Trojan Network virus
  10. 10. ||| VIRUS AFFECT TO PC ||| MAIL VIRUS 35% TROJAN HORSE 65% WORMS 75%
  11. 11. VIRUS SPREADING A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive How to Prevent Computer Viruses: 9 Tips to Keep Your PC Safe •Use Strong Passwords. Let's start with the basics—your passwords. ... •Keep Everything up to Date. ... •Use Antivirus Software. ... •Use a Firewall. ... •Install a Popup Blocker. ... •Beware of Email Phishing Scams. ... •Educate Your Family & Staff. ... •Know the Signs of Infection.
  12. 12. Top 5 Sources of Computer Virus Attack Email - Attachments Downloadable Program Booting From CD The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hampers important work involved with data and documents. It is imperative for every computer user to be aware about the software and programs that can help to protect the personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks. The top sources of virus attacks are highlighted below: Internet Cracked Software
  13. 13. Best antivirus software YOU MUST HAVE
  14. 14. Top Hackers in the World Hacked (NORAD) American defence US Military Defence, NASA Biggest bank hacker 10 billion dollars Hacking Google and overvelming fax machines 4th 3rd 2nd 1st 3Valdmir. 4.Gary McKinnon 1.Kevin Mintik 2.Anonymous

×