KEMBAR78
Hacking presentation BASIC | PPT
Hacking
MADE BY : NAVEEN NAKKA
ROLL NO. : 13765A1007
CLASS: 3rd
YEAR
1. Introduction
2. General Hacking Methods
3. Why do Hackers Hack
4. Negative Effects of Hackers
5. Losses Due to Hackers
6. History of Hackers
7. Top 10 Countries with most Hackers
8. Missuse of Hacking Technology
What is Hacking ?
1.Hacking refers to
the activities which
are done to intrude
some one else’s
personal information
so as to use it for
malicious, unwanted
purposes.
2. Hacking is a term which refers to the activities aimed
at exploiting security flaws to obtain personal information
for gaining access to secured networks.
A typical attacker works in the following manner:
Identify the target system.
Gathering Information on the target system.
Finding a possible loophole in the target system.
Exploiting this loophole using exploit code.
Removing all traces from the log files and escaping without a trace.
When someone hacks a computer or
network system, it's typically for one of
the following reasons:
1. Credit Card Information(for money)
In recent years it has become increasingly possible for
hackers to steal credit card information. With online
shopping and online banking becoming more prevalent, the
opportunity for a skilled hacker to acquire credit card
information continues to grow.
2. Identity Theft
Hackers can potentially steal
identity by simply hacking into a
computer. With a stolen identity,
a hacker can do almost everything.
3. Business Information
In the modern world it is not at all uncommon for incredibly
important business information to be stored on computers.
Hackers can steal financial information, account numbers,
and even client information.
4. Egotism
Some hackers hack computers solely to prove that they can.
These individuals may do anything from small-scale hacking
all the way up to full-on identity.
1. FINANCIAL LOSSES
In 2011, Sony lost $170 million due to a
hack of their PlayStation system. Also
in 2011, CitiGroup lost $2.7 million and
AT&T lost $2 million as a result of
hackers.
2. LOSS OF INFORMATION
Hacking often results in a loss of data
due to files being deleted or changed.
leak of top secret information could
cause real-world security issues.
Servers at the Pentagon, FBI, Interpol
and NASA have all been compromised at
various points. various points in the past ten
years.
1. $171 million – Sony
2. $2.7 million – Citigroup
3. $2 million – Stratfor
4. $2 million – AT&T
 1980s
- Cyberspacecoined
-414 arrested
-Two hackergroups formed
-2600published
 1990s
-NationalCrackdownonhackers
-KevinMitnick arrested
-Microsoft’sNToperating system pierced
Late 1990s
Hackers break into and defacefederal Web
sites, including the U.S. Department of Justice,
U.S. Air Force, CIA, NASA and others.
2013,India : Rs 2.4 crore heist by cyber
criminals who hacked into the Mumbai-based
current account of the RPG Group of
companies.
2011 ,Japan: Sony PlayStation Network Hack To
Cost $170 Million.
1.USA
2.China
3.Turkey
4.Russia
5.Taiwan
6.Brazil
7.Romania
8.India
9.Italy
10.Hungary
Missuse of Hacking Technology
Degree of
Computer
Crime
Amount of Damage or Harm
Required
Penalty
1st
 degree Damage to or the value of the property or
computer services is over $10,000
B felony (up to 20 years in
prison, a fine of up to $15,000,
or both)
2nd
 degree Damage to or the value of the property or
computer services is over $5,000
C felony (up to 10 years in
prison, a fine of up to $10,000,
or both)
3rd
 degree ● Damage to or the value of the property or
computer services is over $1,000
● Reckless conduct that creates a risk of
serious physical injury to another person
D felony (up to five years in
prison, a fine of up to $5,000, or
both)
4th
 degree Damage to or the value of the property or
computer services is over $500
A misdemeanor (up to one year
in prison, a fine of up to $2,000,
or both)
5th
 degree Damage to or the value of the property or
computer services, if any, is $500 or less
B misdemeanor (up to six
months in prison, a fine of up to
$1,000, or both)
Thank you
Thanks for your attention…!!!
Any Queries ??

Hacking presentation BASIC

  • 1.
    Hacking MADE BY :NAVEEN NAKKA ROLL NO. : 13765A1007 CLASS: 3rd YEAR
  • 2.
    1. Introduction 2. GeneralHacking Methods 3. Why do Hackers Hack 4. Negative Effects of Hackers 5. Losses Due to Hackers 6. History of Hackers 7. Top 10 Countries with most Hackers 8. Missuse of Hacking Technology
  • 3.
    What is Hacking? 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks.
  • 4.
    A typical attackerworks in the following manner: Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
  • 5.
    When someone hacksa computer or network system, it's typically for one of the following reasons: 1. Credit Card Information(for money) In recent years it has become increasingly possible for hackers to steal credit card information. With online shopping and online banking becoming more prevalent, the opportunity for a skilled hacker to acquire credit card information continues to grow.
  • 6.
    2. Identity Theft Hackerscan potentially steal identity by simply hacking into a computer. With a stolen identity, a hacker can do almost everything. 3. Business Information In the modern world it is not at all uncommon for incredibly important business information to be stored on computers. Hackers can steal financial information, account numbers, and even client information. 4. Egotism Some hackers hack computers solely to prove that they can. These individuals may do anything from small-scale hacking all the way up to full-on identity.
  • 7.
    1. FINANCIAL LOSSES In2011, Sony lost $170 million due to a hack of their PlayStation system. Also in 2011, CitiGroup lost $2.7 million and AT&T lost $2 million as a result of hackers. 2. LOSS OF INFORMATION Hacking often results in a loss of data due to files being deleted or changed. leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points. various points in the past ten years.
  • 8.
    1. $171 million– Sony 2. $2.7 million – Citigroup 3. $2 million – Stratfor 4. $2 million – AT&T
  • 9.
     1980s - Cyberspacecoined -414arrested -Two hackergroups formed -2600published  1990s -NationalCrackdownonhackers -KevinMitnick arrested -Microsoft’sNToperating system pierced
  • 10.
    Late 1990s Hackers breakinto and defacefederal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. 2013,India : Rs 2.4 crore heist by cyber criminals who hacked into the Mumbai-based current account of the RPG Group of companies. 2011 ,Japan: Sony PlayStation Network Hack To Cost $170 Million.
  • 11.
  • 12.
    Missuse of HackingTechnology Degree of Computer Crime Amount of Damage or Harm Required Penalty 1st  degree Damage to or the value of the property or computer services is over $10,000 B felony (up to 20 years in prison, a fine of up to $15,000, or both) 2nd  degree Damage to or the value of the property or computer services is over $5,000 C felony (up to 10 years in prison, a fine of up to $10,000, or both) 3rd  degree ● Damage to or the value of the property or computer services is over $1,000 ● Reckless conduct that creates a risk of serious physical injury to another person D felony (up to five years in prison, a fine of up to $5,000, or both) 4th  degree Damage to or the value of the property or computer services is over $500 A misdemeanor (up to one year in prison, a fine of up to $2,000, or both) 5th  degree Damage to or the value of the property or computer services, if any, is $500 or less B misdemeanor (up to six months in prison, a fine of up to $1,000, or both)
  • 13.
  • 14.
    Thanks for yourattention…!!! Any Queries ??