HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
ETHICAL HACKING.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Web server security Dr Jim Briggs WEBP security1.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Internet safety By Lydia Snowden.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber crime & Security Prepared by : Rughani Zarana.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security By Duncan Hall.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Technical Implementation: Security Risks
Seminar On Ethical Hacking Submitted To: Submitted By:
SECURITY CYBER CRIME AND ABUSE
Network Security (the Internet Security)
GCSE ICT SECURITY THREATS.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Secure Software Confidentiality Integrity Data Security Authentication
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Computer Data Security & Privacy
Seminar On Cyber Crime Submitted To: Submitted By:
I S P S loss Prevention.
Chapter 5 Electronic Commerce | Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
Ethical hacking
Tool Server Workstation Router Universal
Computer Security Elaine Munn Introduction to Computer Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 7 – Organisational Systems Security
BCT 2.00 Analyze Technology Issues
Chapter 5 Electronic Commerce | Security
HOW DO I KEEP MY COMPUTER SAFE?
Ethical Hacking.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.

What is ?  Hacking is the process of achieving access to a computer or computer network without legal authorization.  Hacking is to steal ones secret by breaking security like free internet, free calls, stealing ones mail etc,. i.e. Unauthorized access of computer

What factors does to attack ? Curiosity Money Spying Prestige Intellectual Challenge Anarchy

Why Do Hackers Attack?  A challenge, or “to see if I can”  Obtain a company’s secrets or insider information  Steal credit card numbers  Steal passwords to other systems  To steal programs or files  Read others’  Stalking

There are two major types of hacking:  White Hat Hacking  Black Hat Hacking

White Hat Hacking:  White hat hacking is a positive type of hacking.  Also called as Ethical Hacking.  An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking.

Black Hat Hacking:  A black Hat Hackers is a negative type of Hacking.  A black hat hacker, also known as a cracker or a dark side hacker.  Someone who uses his skills with a criminal intent. E.g. cracking bank, or attacking the computer network of an organization for money.

There are three main levels of hacking. 1. Local Hacking. 2. Social Networking Hacking. 3. Remote Hacking

Types Of Hacking which comes under black & white hat Hacking 1)Inside Jobs 2) Rogue Access Points 3) Back Doors 4) Denial of Service 5) Sniffing and Spoofing

FIREWALL: It is a system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect “inside” network from “outside network.

Seven simple things to protect our system from hackers Implement a firewall Develop a corporate security policy Install anti-virus software Keep operating systems up to date Don't run unnecessary network services Conduct a vulnerability test Keep informed about network security

Conclusion:  A level-headed approach should be taken by all Internet users to protect their privacy and security online.  And to ensure that they have to educate and inform themselves of the more serious risks involved in maintaining any kind of Internet presence.

References: Hacker /index-security.php Hacking Techniques: Hacking:

? ? ? ? ? ? ?