SlideShare a Scribd company logo
Hacking (1)
Hacking (1)
WHAT IS SECURITY
 Security is the degree of resistance to, or
protection from, harm.
It is the state of being free from danger or
threat.
Difference Between Security and
Protection
Security and protection are extremely close
concepts though not same.
 Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
What is Hacking?
Hacking refers to an array of activities which are done to
intrude some one else’s personal information space so as
to use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical information for
gaining access to secured networks.
A Brief History of Hacking
• 1980s
- Cyberspace coined
-414 arrested
-Two hacker groups formed
-2600 published
• 1990s
-National Crackdown on hackers
-Kevin Mitnick arrested
-Microsoft’s NT operating system pierced
A Brief History of Hacking
• 2001
– In one of the biggest denial-of-service attack, hackers launched attacks
against eBay, Yahoo!, CNN.com., Amazon and others.
• 2007
– Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded
nearly $1 Million has been stolen in three months from 250 customer
account.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris
Overview of Hacking
 Hack
• Examine something very minutely
• The rapid crafting of new program or the making
of changes to existing, usually complicated
software
 Hacker
• The person who hacks
 Cracker
• System intruder/ destroyer
• Black hat hackers
History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
Hacker and Ethical Hacker
 Hacker
• Access computer system or network without
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Types of Hacker
 White Hat Hacker
• Good guys
• Don’t use their skill for illegal purpose
• Computer security experts and help to protect from Black
Hats.
Black Hat Hacker
• Bad guys
• Use their skill maliciously for personal gain
• Hack banks, steal credit cards and deface websites
 Grey Hat Hacker
• It is a combination of White hat n Black Hat Hackers
• Goal of grey hat hackers is to provide national security.
• A grey hat hacker may surf the Internet and hack into a
computer system for the sole purpose of notifying the
administrator that their system has a security defect, for
example. They may then offer to correct the defect for a
fee

More Related Content

What's hot (20)

PPTX
Hacking
Haider Akbar
 
KEY
Computer crime hacking
tangytangling
 
PPTX
ethical hacking
Neelima Bawa
 
PPTX
Ethicalhacking
pavankumarmangena
 
PDF
Computer hacking – Is it Ethical PPT
Vivekanandan M
 
PDF
Cyber Security & Information Warfare : A global security issue
Vincent Joassin
 
PPTX
Cyber security
Luke Veltjens-Swan
 
PPTX
Etical hacking
talhaabid
 
PPT
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
PPTX
Cyber security.pptx
MananSharma75241
 
PPT
Introduction To Ethical Hacking
Akshay Kale
 
PPT
Ethical hacking presentation
Georgekutty Francis
 
PDF
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
PPTX
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Career Communications Group
 
PPTX
Ethical Hacking
DEEPIKA WALIA
 
PPTX
"Hacking"
Ameesha Indusarani
 
PPTX
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
PPTX
O'leary Cyber Secutiry
sefreed
 
PPTX
Hacking
NarendraGadde2
 
Hacking
Haider Akbar
 
Computer crime hacking
tangytangling
 
ethical hacking
Neelima Bawa
 
Ethicalhacking
pavankumarmangena
 
Computer hacking – Is it Ethical PPT
Vivekanandan M
 
Cyber Security & Information Warfare : A global security issue
Vincent Joassin
 
Cyber security
Luke Veltjens-Swan
 
Etical hacking
talhaabid
 
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Cyber security.pptx
MananSharma75241
 
Introduction To Ethical Hacking
Akshay Kale
 
Ethical hacking presentation
Georgekutty Francis
 
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Career Communications Group
 
Ethical Hacking
DEEPIKA WALIA
 
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
O'leary Cyber Secutiry
sefreed
 

Viewers also liked (6)

PDF
«Тарифна мобілізація»: уся правда про тарифи
tarifna_mobilizaciya
 
PPTX
ICTfkipunsri_DentiOktaviani
denti oktaviani
 
PPTX
Презентация гостиничного комплекса "Днепр"
dnieper_hotel
 
PPTX
Preparation Of Specimen For Microscopic Examination
PATEL DEEP
 
PDF
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
Iiro Lamppu
 
«Тарифна мобілізація»: уся правда про тарифи
tarifna_mobilizaciya
 
ICTfkipunsri_DentiOktaviani
denti oktaviani
 
Презентация гостиничного комплекса "Днепр"
dnieper_hotel
 
Preparation Of Specimen For Microscopic Examination
PATEL DEEP
 
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
Iiro Lamppu
 

Similar to Hacking (1) (20)

PPTX
Ethical hacking presentation
Suryansh Srivastava
 
PPTX
Ethical Hacking
Rishab garg
 
PPT
hacking
mayank1293
 
PPTX
Ethical hacking
Goutham Shetty
 
PPTX
Ethical Hacking
Tharindu Kalubowila
 
PPTX
Hacking
VipinYadav257
 
KEY
Computer crime hacking
tangytangling
 
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
BhimNathTiwari1
 
PPTX
SIEM Fundamentals-Session 1 presentations
ShivanandManjaragi2
 
PPT
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
PPTX
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
AnjieVillarba1
 
PPTX
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
PPTX
Hacking
Farkhanda Kiran
 
PPTX
Hacking
Farkhanda Kiran
 
PPTX
Ethical Hacking
Aryan Saxena
 
PPTX
An An Exploration Into the Cyber Security
sivasakthin2022cse
 
PPTX
Hacking (1)
Deepu Näñí
 
PPTX
cybersecurity notes important points.pptx
dhumaletiku
 
PPT
Hacking
Purohit Rock
 
PPTX
Hacking (cs192 report )
Elipeta Sotabento
 
Ethical hacking presentation
Suryansh Srivastava
 
Ethical Hacking
Rishab garg
 
hacking
mayank1293
 
Ethical hacking
Goutham Shetty
 
Ethical Hacking
Tharindu Kalubowila
 
Hacking
VipinYadav257
 
Computer crime hacking
tangytangling
 
Cyber security.pptxelectronic systems, networks, and data from malicious
BhimNathTiwari1
 
SIEM Fundamentals-Session 1 presentations
ShivanandManjaragi2
 
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
AnjieVillarba1
 
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Hacking
Farkhanda Kiran
 
Ethical Hacking
Aryan Saxena
 
An An Exploration Into the Cyber Security
sivasakthin2022cse
 
Hacking (1)
Deepu Näñí
 
cybersecurity notes important points.pptx
dhumaletiku
 
Hacking
Purohit Rock
 
Hacking (cs192 report )
Elipeta Sotabento
 

Recently uploaded (20)

PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PDF
John Keats introduction and list of his important works
vatsalacpr
 
PPTX
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PPTX
Rules and Regulations of Madhya Pradesh Library Part-I
SantoshKumarKori2
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
Introduction to Probability(basic) .pptx
purohitanuj034
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
John Keats introduction and list of his important works
vatsalacpr
 
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
Rules and Regulations of Madhya Pradesh Library Part-I
SantoshKumarKori2
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Introduction to Probability(basic) .pptx
purohitanuj034
 

Hacking (1)

  • 3. WHAT IS SECURITY  Security is the degree of resistance to, or protection from, harm. It is the state of being free from danger or threat.
  • 4. Difference Between Security and Protection Security and protection are extremely close concepts though not same.  Security measures are adopted to increase the level of protection The feeling of protection arises when one has enough security measures Security is a type of protection against external threats.
  • 5. What is Hacking? Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 6. A Brief History of Hacking • 1980s - Cyberspace coined -414 arrested -Two hacker groups formed -2600 published • 1990s -National Crackdown on hackers -Kevin Mitnick arrested -Microsoft’s NT operating system pierced
  • 7. A Brief History of Hacking • 2001 – In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others. • 2007 – Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account.
  • 8. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Mark AbeneLinus Torvalds Robert Morris
  • 9. Overview of Hacking  Hack • Examine something very minutely • The rapid crafting of new program or the making of changes to existing, usually complicated software  Hacker • The person who hacks  Cracker • System intruder/ destroyer • Black hat hackers
  • 10. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 11. Hacker and Ethical Hacker  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 12. Types of Hacker  White Hat Hacker • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats. Black Hat Hacker • Bad guys • Use their skill maliciously for personal gain • Hack banks, steal credit cards and deface websites  Grey Hat Hacker • It is a combination of White hat n Black Hat Hackers • Goal of grey hat hackers is to provide national security. • A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee