KEMBAR78
Hacking computer crime | PPTX
COMPUTER CRIME
Eldo Raju N
 The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called
Hacking.
Hacker: In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a computer
system or computer network.
Website Hacking
Network Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
 Ethical Hacking
 Website Hacking : Hacking a website means taking control from the website owner to
a person who hacks the website.
 Network Hacking : Network Hacking is generally means gathering information about
domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the
network.
 Email Hacking: Email hacking is unauthorized access to an email account or email
correspondence.
 Password Hacking : Password Hacking Password cracking is the process of recovering
secret passwords from data that has been stored in or transmitted by a computer
system
 Online Banking Hacking: Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without permission of account holder is
known as Online banking hacking.
 Computer Hacking: Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
 Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a
system and then usually patches them.
 Thrill-Seeker Hacker: Person who break into a computer system for
entertainment the reward is usually admiration of their fellow hackers
 White-Hat Hackers: The hackers who legitimately , with the knowledge of the
owners of the IT system, try to break in to find and fix vulnerable area of the
system. They are also called ethical Hackers, counter hackers or penetration
hackers.
 Black-Hat Hackers : They exploit or destroy the information they find steal
passwords, or otherwise cause harm to the computer network for some benefits
 Hacktivist : Are politically motivated hackers who use the internet to send a
political message of some kind.
Eg: Indian government sites are hacked by Pakistan hackers for political gain
 Cyber terrorists: is one who seeks to cause harm to people or destroy critical
systems or information. Possible targets of violent attacks would be air traffic
control systems and nuclear power plants, or anything that could harm the
infrastructure of a nation.
 Using Firewalls
 Using Anti Virus Software
 Restrict software installation
 Change default passwords on systems and devices
 Do not use official email ID to subscribe to public groups
 Data encryption
 Do not expose your passwords to untrusted websites
 Practice to use exact web address
 Turn off your internet connection when not in use
CONSEQUENCES OF
HACKING
 Thousands of rupees in fines
 Imprisonment
 Seizure of your computer and hardware
Hacking computer crime

Hacking computer crime

  • 1.
  • 2.
     The Processof attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. Hacker: In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
  • 3.
    Website Hacking Network Hacking EmailHacking Password Hacking Online Banking Hacking Computer Hacking  Ethical Hacking
  • 4.
     Website Hacking: Hacking a website means taking control from the website owner to a person who hacks the website.  Network Hacking : Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.  Email Hacking: Email hacking is unauthorized access to an email account or email correspondence.  Password Hacking : Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system  Online Banking Hacking: Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  Computer Hacking: Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 5.
     Thrill-Seeker Hacker:Person who break into a computer system for entertainment the reward is usually admiration of their fellow hackers  White-Hat Hackers: The hackers who legitimately , with the knowledge of the owners of the IT system, try to break in to find and fix vulnerable area of the system. They are also called ethical Hackers, counter hackers or penetration hackers.  Black-Hat Hackers : They exploit or destroy the information they find steal passwords, or otherwise cause harm to the computer network for some benefits  Hacktivist : Are politically motivated hackers who use the internet to send a political message of some kind. Eg: Indian government sites are hacked by Pakistan hackers for political gain  Cyber terrorists: is one who seeks to cause harm to people or destroy critical systems or information. Possible targets of violent attacks would be air traffic control systems and nuclear power plants, or anything that could harm the infrastructure of a nation.
  • 6.
     Using Firewalls Using Anti Virus Software  Restrict software installation  Change default passwords on systems and devices  Do not use official email ID to subscribe to public groups  Data encryption  Do not expose your passwords to untrusted websites  Practice to use exact web address  Turn off your internet connection when not in use
  • 7.
    CONSEQUENCES OF HACKING  Thousandsof rupees in fines  Imprisonment  Seizure of your computer and hardware