Haking PPT
-
Upload
sushil-ranjan -
Category
Internet
-
view
338 -
download
0
Transcript of Haking PPT
![Page 1: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/1.jpg)
Sushil Kumar ranjan
15CA86
1
![Page 2: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/2.jpg)
ContentsHistory of Hacking
What is Hacking?
Why do Hackers hack?
Types of Hacking
Advantages of Hacking
Disadvantages of Hacking
Conclusion
References
2
![Page 3: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/3.jpg)
History of HackingHacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of theterm “hacker”.
The truth hacker amongst our societies have thirst forthe knowledge .
Boredom is never an object of challenge for thehacker
3
![Page 4: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/4.jpg)
What is Hacking ?The Process of attempting to gain or
successfully gaining, unauthorized accessto computer resources is called Hacking.
4
![Page 5: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/5.jpg)
Why do hackers hack ?Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
6
![Page 6: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/6.jpg)
Types of HackingWebsite Hacking
Network Hacking
Ethical Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking 7
![Page 7: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/7.jpg)
Website Hacking Hacking a website means taking control from the
website owner to a person who hacks the website.
8
![Page 8: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/8.jpg)
Network Hacking
Network Hacking is generally meansgathering information about domain byusing tools like Telnet, Ns look UP, Ping,Tracert, Netstat, etc… over the network.
9
![Page 9: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/9.jpg)
Email Hacking Email hacking is illicit access to an email
account or email correspondence.
11
![Page 10: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/10.jpg)
Password Hacking
Password Hacking Password crackingis the process of recovering secretpasswords from data that has beenstored in or transmitted by a computersystem.
12
![Page 11: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/11.jpg)
Online Banking HackingOnline banking Hacking Unauthorizedaccessing bank accounts without knowingthe password or without permission ofaccount holder is known as Online bankinghacking.
13
![Page 12: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/12.jpg)
Computer Hacking
Computer Hacking is when files on yourcomputer are viewed, created, or editedwithout your authorization.
14
![Page 13: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/13.jpg)
15
![Page 14: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/14.jpg)
Advantages of hacking
Can be used to recover lost information where thecomputer password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
18
![Page 15: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/15.jpg)
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
19
![Page 16: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/16.jpg)
ConclusionKeep your password protected. Write your password
should be with combination of characters, digits, specialsymbols. Do not respond to feck on fishing email. whenyou are doing any online transection always keep watchon site whether the protocol of site is https & whetherthere is a lock symbol .
20
![Page 17: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/17.jpg)
References
www.wikipedia.org/wiki/Hacker
www.makeuseof.com
www.wikipedia.org/wiki/Hacking
21
![Page 18: Haking PPT](https://reader034.fdocuments.in/reader034/viewer/2022051710/58f188041a28ab2a778b4597/html5/thumbnails/18.jpg)
Thank You
22