• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Brief Introduction of Hackers

Brief Introduction of Hackers



My First Slide in High School =D

My First Slide in High School =D



Total Views
Views on SlideShare
Embed Views



2 Embeds 2

https://bb.csueastbay.edu 1
http://www.linkedin.com 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.


11 of 1 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • An Article about Hacking importance
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Brief Introduction of Hackers Brief Introduction of Hackers Presentation Transcript

    • Wesley Methodist School ICT 2006 Hackers Su Ning En 4M
    • Contents:
      • Opening [slide 1]
      • Contents [slide 2]
      • Introduction on hacking [slide 3]
      • Different type Of Hacking [slide 4]
      • Requirements for Ethical Hackers [slide 5]
      • Criminals [slide 6]
      • Effects [slide7]
      • Prevention [slide 8]
      • Summary: Conclusion [slide 9]
      • Source of Information [slide 10]
    • Hacking:
      • Hacking is unauthorized use of computer and network resources and also mean a very gifted programmer.
      • There are many definitions of hacking, as well as varying ideas of what a hacker is or does. Simply stated a hacker is any programming specialist who has the expertise to enter a computer or network without proper authorization.
    • Different Types of Hacking:
      • The Criminal Hacker
      • Deface hacked web pages to advertise their prowess
      • Doings are evil and illegal
      • Work to get illegal information for themselves or for someone else
      • The Ethical Hacker
      • Hired as a preventive measure
      • Doings are good and justice
      • Ex. Breaking into the clients’ computing network to identify potential security lapses
    • Requirements for Ethical Hackers:
      • One should possess good programming skills and computer networking skills; several experience in installing and maintaining popular operating systems-ex. UNIX/Linux and Windows NT
      • Good communications skills as ‘Social Engineering’ is used to test the client organizing staff security awareness to valuable information that may be obtained
      • Patience, Determination and Trustworthiness are vital between the ethical hacker and the client
    • Different types of Hacking Attacks: A simple attack but the result is impressive. A complicated attack, only the hacker understand. An attack that is against all rules. Hacking Attacks Simplicity Mastery Illicitness
    • Effects of Hacking:
      • Individuals
      • - credit cards numbers may be stolen, the files in your computer is destroyed or missing
      • Organizations and Companies
      • bankruptcy, losing customers due to customer’s lack of confidence, software stolen, breaking the main system of the company causing the company' server to slow down
      • Countries
      • - Hackers are known to steal military intelligence, breaking the main system might cause the fall of all banks
    • Prevention:
      • Website defacement attempts can be stopped by implementing sound computer security practices
      • To prevent hack attacks as much as possible is not using a default accounts, passwords on network devices-using strong passwords and changing them on a regular basis
      • Using an industry-standard security testing methodology is recommended.
    • Conclusion or Summary:
      • In conclusion, Hackers are professionals when they were first known but when technology advance to a new stage from day to day, people became more interested in the cyber world. Thus, earning the hackers a bad name by hacking into other computers to demonstrate their strength. Following this path, hackers were then categories to several cases for criminals and ethical.
    • Source of Information:
      • Star Newspaper - Friday 11 March 2005, pg 20 Nation ‘Hackers deface 45 local websites’
      • Magazine - CoursesNow!ExploreIT! [published by gti] issue 8-2006-brought by doctorjob.com.my
      • Internet Connection - http://en.wikipedia.org/wiki/Hackers, http://www.bama.ua.edu/~wilso098/project/hacking/whatishacking.html , http://searchsecurity.techtarget.com/featuredTopic/0,290042,sid7_gci970601,00.html?bucket=REF