KEMBAR78
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES
MADE BY
MAHAM NISAR
SEMESTER 3
HISTORY OF HACKING
 Hacking has been part of computing for 40 years.
 The first computer hacker emerged at MIT.
 The truth hacker amongst our societies have thirst for
the knowledge.
What is hacking
The process of attempting to gain or successfully
gaining, unauthorized access to computer
resources is called hacking.
Who is hacker
• In the computer security context, a hacker is someone
who seeks and exploits weakness in a computer
system or computer network.
• The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a cracker.
Types of hackers
• White hat hackers: who identify the security
weakness of system and inform the owner.
• Black hat hackers: they crash the system and steal
information
• Grey hat hackers: they are somewhere between
white and black hat hackers
Famous hackers in history
Why do hackers hack?
 just for fun
 Show off
 Hack other system secretly.
 Steal important information.
 Destroy enemy's computer network during the war.
Types of hacking
• Website hacking
• Network hacking
• Ethical hacking
• Email hacking
• Password hacking
• Online banking hacking
• Computer hacking
Website hacking
• Hacking a website means taking control from the
website owner to a person who hacks the website.
Network hacking
• Networking hacking is generally means gathering
information about domain by using tools like telnet,
ping, netstat, tracert, e.t.c….over the network.
Ethical hacking
• Ethical hacking is where person hacks to find
weakness in a system and usually patches them.
Email hacking
• Email hacking is illicit access to an email account or
email correspondence.
Password hacking
• Password cracking is the process of recovering secret
passwords from data that has been stored in or
transmitted by a computer system.
Online banking hacking
• Online banking hacking unauthorized accessing bank
accounts without knowing the passwords or without
permission of accounts holder is known as online
banking hacking.
Computer hacking
• Computer hacking is when files on our computer are
viewed, created, or edited without our authorization.
Negative effects of hackers
• Financial losses.
• Loss of information hacking often results in a loss of
data due to files being deleted or changed…..
• Decreased privacy when hackers gain access to your
computer, they can see everything…..
• Damaged reputation.
What should do after hacked?
 Shut down the system.
Or turn off the computers.
 Separate the system from network.
 Restore system with backup.
or reinstall all programs.
Refrences
• www.wikipedia.org/wiki/hacker
• www.wikipedia.org/wiki/hacking
HACKING AND ITS TYPES.pptx

HACKING AND ITS TYPES.pptx

  • 1.
    HACKING AND ITSTYPES MADE BY MAHAM NISAR SEMESTER 3
  • 2.
    HISTORY OF HACKING Hacking has been part of computing for 40 years.  The first computer hacker emerged at MIT.  The truth hacker amongst our societies have thirst for the knowledge.
  • 3.
    What is hacking Theprocess of attempting to gain or successfully gaining, unauthorized access to computer resources is called hacking.
  • 4.
    Who is hacker •In the computer security context, a hacker is someone who seeks and exploits weakness in a computer system or computer network. • The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 5.
    Types of hackers •White hat hackers: who identify the security weakness of system and inform the owner. • Black hat hackers: they crash the system and steal information • Grey hat hackers: they are somewhere between white and black hat hackers
  • 6.
  • 7.
    Why do hackershack?  just for fun  Show off  Hack other system secretly.  Steal important information.  Destroy enemy's computer network during the war.
  • 8.
    Types of hacking •Website hacking • Network hacking • Ethical hacking • Email hacking • Password hacking • Online banking hacking • Computer hacking
  • 9.
    Website hacking • Hackinga website means taking control from the website owner to a person who hacks the website.
  • 10.
    Network hacking • Networkinghacking is generally means gathering information about domain by using tools like telnet, ping, netstat, tracert, e.t.c….over the network.
  • 11.
    Ethical hacking • Ethicalhacking is where person hacks to find weakness in a system and usually patches them.
  • 12.
    Email hacking • Emailhacking is illicit access to an email account or email correspondence.
  • 13.
    Password hacking • Passwordcracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 14.
    Online banking hacking •Online banking hacking unauthorized accessing bank accounts without knowing the passwords or without permission of accounts holder is known as online banking hacking.
  • 15.
    Computer hacking • Computerhacking is when files on our computer are viewed, created, or edited without our authorization.
  • 16.
    Negative effects ofhackers • Financial losses. • Loss of information hacking often results in a loss of data due to files being deleted or changed….. • Decreased privacy when hackers gain access to your computer, they can see everything….. • Damaged reputation.
  • 17.
    What should doafter hacked?  Shut down the system. Or turn off the computers.  Separate the system from network.  Restore system with backup. or reinstall all programs.
  • 18.