SlideShare a Scribd company logo
Pranav patade
Hacking
Advantages
Keep us alert
about our safety
Can be used to
recover lost
information
where the
computer
password has
been lost
Disadvantages Criminal can use
it & harm privacy
Although hacking is most often associated in
the popular consciousness with one code
breaker breaking into a computer to steal data
or wreak havoc, the word is used in a variety of
senses. Within tech communities, the word
often refers to "hacking together" a quick
program to solve a problem creatively. hacking
someone account is disrespecting some ones
privacy.
What is hacking?
Hackers do what they do using a variety of
methods. They're usually adept at working with
computers, which makes them good at finding
security vulnerabilities. Another way that
hackers get data that is seldom discussed is
called "social engineering." Social engineering is
a private investigator-like way of getting data;
you pose as someone you're not on the phone or
in an email to get the information you need.
How is hacking done?
Not all hackers are bad. Many work for good in
a variety of ways. "White hat" hackers are
hackers that work to either expose
vulnerabilities in computer systems so they can
be repaired or exploit vulnerabilities in
organizations they dislike as a form of activism.
Although hacking really is isn't as glamorous as
it is in the movies, the reality is a lot more
interesting. There's clearly more to it than lone
code breakers breaking into government
computer systems overnight.
Are all hackers bad?
Hacking
1. White hat hackers -
source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29
Struan Robertson, legal director at Pinsent Masons LLP, and editor of
OUT-LAW.com, says "Broadly speaking, if the access to a system is
authorized, the hacking is ethical and legal. If it isn't, there's an
offence under the Computer Misuse Act. The unauthorized access
offence covers everything from guessing the password, to accessing
someone's webmail account, to cracking the security of a bank. The
maximum penalty for unauthorized access to a computer is two years
in prison and a fine. There are higher penalties – up to 10 years in
prison – when the hacker also modifies data". Unauthorized access
even to expose vulnerabilities for the benefit of many is not legal, says
Robertson. "There's no defense in our hacking laws that your behavior
is for the greater good. Even if it's what you believe."
Legal hackers hacking with good intention
not have intention harm any ones privacy
"black hat" hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
Black hat hackers form the stereotypical, illegal hacking groups often
portrayed in popular culture, and are "the epitome of all that the public
fears in a computer criminal". Black hat hackers break into secure networks
to destroy, modify, or steal data; or to make the network unusable for those
who are authorized to use the network. Black hat hackers are also referred
to as the "crackers" within the security industry and by modern
programmers. Crackers keep the awareness of the vulnerabilities to
themselves and do not notify the general public or the manufacturer for
patches to be applied. Individual freedom and accessibility is promoted over
privacy and security. Once they have gained control over a system, they
may apply patches or fixes to the system only to keep their reigning control.
Richard Stallman invented the definition to express the maliciousness of a
criminal hacker versus a white hat hacker who performs hacking duties to
identify places to repair.
2. Black hat hackers -
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Grey hat hacker lies between a black hat and a white
hat hacker. A grey hat hacker may surf the Internet and
hack into a computer system for the sole purpose of
notifying the administrator that their system has a
security defect, for example. They may then offer to
correct the defect for a fee. Grey hat hackers sometimes
find the defect of a system and publish the facts to the
world instead of a group of people. Even though grey
hat hackers may not necessarily perform hacking for
their personal gain, unauthorized access to a system
can be considered illegal and unethical.
3. Grey hat hackers
Just like a golden middle stage between white and
black hat hackers
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
 Elite hacker –
social status among hackers, elite is used to describe the most skilled. Newly discovered
exploits circulate among these hackers. Elite groups such as Masters of Deception
conferred a kind of credibility on their members.
 Script kiddies -
script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into
computer systems by using automated tools written by others (usually by other black hat
hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid,
child—an individual lacking knowledge and experience, immature),usually with little
understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is
someone who is new to hacking or preaching and has almost no knowledge or experience
of the workings of technology and hacking.
 Blue hat –
blue hat hacker is someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft
also uses the term Blue Hat to represent a series of security briefing events. HacktivistA
hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or
political message.Hacktivism can be divided into two main groups:Cyberterrorism —
Activities involving website defacement or denial-of-service attacks; and,Freedom of
information — Making information that is not public, or is public in non-machine-
readable formats, accessible to the public.
Types of hacking
progarmmes
Trojan
horses
A Trojan horse is a
program that seems to
be doing one thing but
is actually doing
another. It can be used
to set up a back door in
a computer system,
enabling the intruder to
gain access later. (The
name refers to the horse
from the Trojan War,
with the conceptually
similar function of
deceiving defenders into
bringing an intruder
into a protected area.)
Computer
virus
A virus is a self-
replicating program
that spreads by
inserting copies of itself
into other executable
code or documents. By
doing this, it behaves
similarly to a biological
virus, which spreads by
inserting itself into
living cells. While some
viruses are harmless or
mere hoaxes, most are
considered malicious.
Computer
worm
Like a virus, a worm is
also a self-replicating
program. It differs
from a virus in that
(a.) it propagates
through computer
networks without
user intervention; and
(b.) does not need to
attach itself to an
existing program.
Nonetheless, many
people use the terms
"virus" and "worm"
interchangeably to
describe any self-
propagating program.
1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy—
are very popular with hackers.
2) Helba from the .hack manga and anime series
for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Books related with hacking -
Films
1) Antitrust
2) Cypher
3) Eagle Eye
4)Enemy of the State
5)Firewall
6)Girl With The Dragon
7)Tattoo
8)Hackers
9)LiveFree or Die Hard
10)The Matrix series
Etc.
Thank you
All references are from >

More Related Content

What's hot (20)

HACKING
HACKINGHACKING
HACKING
Shubham Agrawal
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
hacking
hackinghacking
hacking
mayank1293
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Institute of Information Security (IIS)
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 

Similar to Hacking (20)

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
dharmesh ram
 
hacking basics
hacking basicshacking basics
hacking basics
dharmesh ram
 
Hackers
HackersHackers
Hackers
kaneesha1234
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
hacking
hackinghacking
hacking
Courtney Cole
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
Athina MINAIDI
 
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
HACKERS-CRACKERS.pptx HACKERS AND CRACKERSHACKERS-CRACKERS.pptx HACKERS AND CRACKERS
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
naagclowie31
 
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptxGEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
AnjieVillarba1
 
Intro
IntroIntro
Intro
Kalkey
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
Cikgu Syam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
HACKERS-CRACKERS.pptx HACKERS AND CRACKERSHACKERS-CRACKERS.pptx HACKERS AND CRACKERS
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
naagclowie31
 
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptxGEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
AnjieVillarba1
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
Cikgu Syam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 

Recently uploaded (20)

Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 

Hacking

  • 2. Hacking Advantages Keep us alert about our safety Can be used to recover lost information where the computer password has been lost Disadvantages Criminal can use it & harm privacy
  • 3. Although hacking is most often associated in the popular consciousness with one code breaker breaking into a computer to steal data or wreak havoc, the word is used in a variety of senses. Within tech communities, the word often refers to "hacking together" a quick program to solve a problem creatively. hacking someone account is disrespecting some ones privacy. What is hacking?
  • 4. Hackers do what they do using a variety of methods. They're usually adept at working with computers, which makes them good at finding security vulnerabilities. Another way that hackers get data that is seldom discussed is called "social engineering." Social engineering is a private investigator-like way of getting data; you pose as someone you're not on the phone or in an email to get the information you need. How is hacking done?
  • 5. Not all hackers are bad. Many work for good in a variety of ways. "White hat" hackers are hackers that work to either expose vulnerabilities in computer systems so they can be repaired or exploit vulnerabilities in organizations they dislike as a form of activism. Although hacking really is isn't as glamorous as it is in the movies, the reality is a lot more interesting. There's clearly more to it than lone code breakers breaking into government computer systems overnight. Are all hackers bad?
  • 7. 1. White hat hackers - source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29 Struan Robertson, legal director at Pinsent Masons LLP, and editor of OUT-LAW.com, says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offence under the Computer Misuse Act. The unauthorized access offence covers everything from guessing the password, to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe." Legal hackers hacking with good intention not have intention harm any ones privacy
  • 8. "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair. 2. Black hat hackers - Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 9. Grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical. 3. Grey hat hackers Just like a golden middle stage between white and black hat hackers Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 10.  Elite hacker – social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.  Script kiddies - script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is someone who is new to hacking or preaching and has almost no knowledge or experience of the workings of technology and hacking.  Blue hat – blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term Blue Hat to represent a series of security briefing events. HacktivistA hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.Hacktivism can be divided into two main groups:Cyberterrorism — Activities involving website defacement or denial-of-service attacks; and,Freedom of information — Making information that is not public, or is public in non-machine- readable formats, accessible to the public.
  • 12. Trojan horses A Trojan horse is a program that seems to be doing one thing but is actually doing another. It can be used to set up a back door in a computer system, enabling the intruder to gain access later. (The name refers to the horse from the Trojan War, with the conceptually similar function of deceiving defenders into bringing an intruder into a protected area.) Computer virus A virus is a self- replicating program that spreads by inserting copies of itself into other executable code or documents. By doing this, it behaves similarly to a biological virus, which spreads by inserting itself into living cells. While some viruses are harmless or mere hoaxes, most are considered malicious. Computer worm Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self- propagating program.
  • 13. 1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy— are very popular with hackers. 2) Helba from the .hack manga and anime series for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 Books related with hacking -
  • 14. Films 1) Antitrust 2) Cypher 3) Eagle Eye 4)Enemy of the State 5)Firewall 6)Girl With The Dragon 7)Tattoo 8)Hackers 9)LiveFree or Die Hard 10)The Matrix series Etc.