This document discusses various topics related to hacking including definitions of hacking and different types of hackers. It defines hacking as attempting to gain unauthorized access to computer systems and networks. It outlines different types of hacking such as website hacking, network hacking, email hacking, and password hacking. The document also discusses famous hackers throughout history, reasons why hackers hack, how to secure systems and data from hacking, and the advantages and disadvantages of hacking.
An overview of hacking, including its definition, types in different contexts, and the agenda for the presentation.
Hacking is gaining unauthorized access to computer resources. A hacker exploits system weaknesses; the difference between hackers and crackers is noted.
Mention of notable hackers in history such as Ian Murphy and Kevin Mitnick, including an allusion to the group Anonymous.
Various reasons why individuals hack, including fun, showing off, theft of information, and sabotage.
Different kinds of hacking such as website, network, ethical, email, password, online banking, and computer hacking.
Steps to take after a hacking incident, including shutting down systems and contacting authorities.
Guidelines for creating strong passwords and methods to secure data using various character substitutions.
Benefits include data recovery and security testing (ethical hacking), while disadvantages highlight privacy invasion and illegality.
Best practices to protect passwords and online transactions, along with references for further information.
A cryptic ending that emphasizes online security, depicted through a stylized phrase.
Contents
What isHacking?
Who is Hacker?
Famous hackers in history
Why do Hackers hack?
Types of Hacking
How to give a password to account
What should do after hacked
How to secure our data
Advantages of Hacking
Disadvantages of Hacking
Conclusion
References
3.
What is Hacking?
The Process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources
is called Hacking.
4.
Who is ahacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
5.
Famous Hackers inHistory
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
6.
And most ofus know ANONYMOUS.
Here are some of there logos
7.
Why do hackershack ?
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
Website Hacking
Hacking awebsite means taking control from the
website owner to a person who hacks the
website.
10.
Network Hacking
NetworkHacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
11.
Ethical hackingis where a person hacks to find
weaknesses in a system and then usually patches them.
12.
Email Hacking
Emailhacking is illicit access to an email
account or email correspondence.
13.
Password Hacking
PasswordHacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
14.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of
account holder is known as Online banking hacking.
15.
Computer Hacking
ComputerHacking is when files on your computer are
viewed, created, or edited without your
authorization.
16.
What should wedo after hacked?
Shutdown the system
− Or turn off the system
Separate the system from network
Restore the system with the backup
− Or reinstall all programs
Connect the system to the network
It can be good to call the police
17.
How to givea password to account
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or
symbols to
create a unique password.
18.
How to secureour data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck or k
Ck or k -> x
# -> H
19.
How to secureour data
Ex.
1 +r4||$ph3rr3d D#$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I transferred Dhs.100000 to your account, So go ahead as our
plan.
20.
Advantages of hacking
Can be used to recover lost information where
the computer password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own
network.
They call it white hat computer hacking.
Conclusion
Keep yourpassword protected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .