Presentation is loading. Please wait.

Presentation is loading. Please wait.

HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.

Similar presentations


Presentation on theme: "HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College."— Presentation transcript:

1 HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.

2 What is H@cking ?  Hacking is the process of achieving access to a computer or computer network without legal authorization.  Hacking is to steal ones secret by breaking security like free internet, free calls, stealing ones mail etc,. i.e. Unauthorized access of computer

3 What factors does to attack ? Curiosity Money Spying Prestige Intellectual Challenge Anarchy

4 Why Do Hackers Attack?  A challenge, or “to see if I can”  Obtain a company’s secrets or insider information  Steal credit card numbers  Steal passwords to other systems  To steal programs or files  Read others’ email  Stalking

5 There are two major types of hacking:  White Hat Hacking  Black Hat Hacking

6 White Hat Hacking:  White hat hacking is a positive type of hacking.  Also called as Ethical Hacking.  An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking.

7 Black Hat Hacking:  A black Hat Hackers is a negative type of Hacking.  A black hat hacker, also known as a cracker or a dark side hacker.  Someone who uses his skills with a criminal intent. E.g. cracking bank, or attacking the computer network of an organization for money.

8 There are three main levels of hacking. 1. Local Hacking. 2. Social Networking Hacking. 3. Remote Hacking

9 Types Of Hacking which comes under black & white hat Hacking 1)Inside Jobs 2) Rogue Access Points 3) Back Doors 4) Denial of Service 5) Sniffing and Spoofing

10 FIREWALL: It is a system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect “inside” network from “outside network.

11 Seven simple things to protect our system from hackers Implement a firewall Develop a corporate security policy Install anti-virus software Keep operating systems up to date Don't run unnecessary network services Conduct a vulnerability test Keep informed about network security

12 Conclusion:  A level-headed approach should be taken by all Internet users to protect their privacy and security online.  And to ensure that they have to educate and inform themselves of the more serious risks involved in maintaining any kind of Internet presence.

13 References: Hacker http://www.net-security.org/text/articleshttp://www.net-security.org/text/articles /index-security.php Hacking Techniques: http://www.securitywatch.com Hacking: www.google.com

14 ? ? ? ? ? ? ?

15


Download ppt "HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College."

Similar presentations


Ads by Google