KEMBAR78
Hacking and its types V2 | PPTX
Hacking
Contents
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
What is Hacking ?
 The Process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources
is called Hacking.
Who is a hacker?
 In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
 The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
And most of us know ANONYMOUS.
Here are some of there logos
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the
website.
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
 Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them.
Email Hacking
 Email hacking is illicit access to an email
account or email correspondence.
Password Hacking
 Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Online Banking Hacking
 Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of
account holder is known as Online banking hacking.
Computer Hacking
 Computer Hacking is when files on your computer are
viewed, created, or edited without your
authorization.
What should we do after hacked?
 Shutdown the system
− Or turn off the system
 Separate the system from network
 Restore the system with the backup
− Or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to give a password to account
 Use unique passwords for your accounts.
 Choose a combination of letters, numbers, or
symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck or k
Ck or k -> x
# -> H
How to secure our data
 Ex.
1 +r4||$ph3rr3d D#$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I transferred Dhs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
 Can be used to recover lost information where
the computer password has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own
network.
 They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
 Keep your password protected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .
References
www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
+#4//X Y0u

Hacking and its types V2

  • 1.
  • 2.
    Contents  What isHacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 3.
    What is Hacking?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 4.
    Who is ahacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 5.
    Famous Hackers inHistory Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 6.
    And most ofus know ANONYMOUS. Here are some of there logos
  • 7.
    Why do hackershack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 8.
    Types of Hacking WebsiteHacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 9.
    Website Hacking Hacking awebsite means taking control from the website owner to a person who hacks the website.
  • 10.
    Network Hacking  NetworkHacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 11.
     Ethical hackingis where a person hacks to find weaknesses in a system and then usually patches them.
  • 12.
    Email Hacking  Emailhacking is illicit access to an email account or email correspondence.
  • 13.
    Password Hacking  PasswordHacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 14.
    Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 15.
    Computer Hacking  ComputerHacking is when files on your computer are viewed, created, or edited without your authorization.
  • 16.
    What should wedo after hacked?  Shutdown the system − Or turn off the system  Separate the system from network  Restore the system with the backup − Or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 17.
    How to givea password to account  Use unique passwords for your accounts.  Choose a combination of letters, numbers, or symbols to create a unique password.
  • 18.
    How to secureour data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck or k Ck or k -> x # -> H
  • 19.
    How to secureour data  Ex. 1 +r4||$ph3rr3d D#$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Dhs.100000 to your account, So go ahead as our plan.
  • 20.
    Advantages of hacking Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  • 21.
    Disadvantages of Hacking Criminalscan use it to their advantage. It can harm someone's privacy It's Illegal
  • 22.
    Conclusion  Keep yourpassword protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .
  • 23.
  • 24.