SlideShare a Scribd company logo
1 of 29
Download to read offline
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
.
PROJECT BY HARSH & RAVI
Hackers are the person who unkindly breaks into systems for
personal gain. Technically, these criminals are crackers
PROJECT BY HARSH & RAVI
Black hats – highly skilled,
malicious, destructive “crackers”
White hats – skills used for
defensive security analysts
Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
PROJECT BY HARSH & RAVI
Reset the Password
Use a Key logger
Command prompt (Linux based)
Phishing
PROJECT BY HARSH & RAVI
The easiest way to "hack" into someone's Facebook is through resetting the
password. This could be easier done by people who are friends with the person
they're trying to hack.
Steps:-
 The first step would be to get your friend's Facebook email login.
 Next, enter victim's email then click on Forgotten your password?
 It will ask if you would like to reset the password via the victim's emails. This
doesn't help, so press No longer have access to these?
 It will now ask you a question.
 If you don't figure out the question, you can click on Recover your account with
help from friends. This allows you to choose between three - five friends.
 It will send them passwords.
PROJECT BY HARSH & RAVI
SOFTWARE
BASED
HARDWARE
BASED
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
Phishing is the most widely used
hacking method for hacking Facebook
passwords. The most widely used
technique in phishing is the use of
Fake Login Pages, also known as
spoofed pages. These fake login
pages resemble the original login
pages of sites like Yahoo , Gmail,
MySpace etc.
PROJECT BY HARSH & RAVI
STEP1:- Go to facebook homepage the right it save webpage as
HTML only by name “INDEX”
STEP2:- create a notepad file for entering following code & saveas
“next.php”
STEP3:- create text file & save as “password”
STEP4:- open INDEX file in notepad press ctrl+F search for action,
now change webpage to next.php and save it
STEP5:- go to www.************.com and log in to your account
STEP6:- upload all the 3 file to website in public directory folder
STEP7:- now ask the person to log in to dummy page of facebook
as he log in its password would be mailed to id or saved to
password.txt
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
 Hacking is the most dangerous enemy of the company
because most of the companies work is done through online.
 If companies a/c or website is hacked then its all private data
may be leaked and competitors may take advantages of that
data.
 Our company’s monopoly product is Faluda syrup all over
Gujarat. So, after being hacked the secret ingredients of
Faluda syrup may revealed. PROJECT BY HARSH & RAVI
MAIN THREATS OF THE COMPANY AFTER BEING HACKED
Account details
Company details
payment structures
Secret ingredients of their products
List of suppliers and its details
List of bulk purchase customers and its details etc..
PROJECT BY HARSH & RAVI
Use an email address specifically for your Facebook
and don't put that email address on your profile.
When choosing a security question and answer,
make it difficult.
Don’t log on an unknown/unsecured pc’s
PROJECT BY HARSH & RAVI
Don’t give access of professional a/c to any
employees or any other person
Try to access your professional a/c on your pcs or
laptop only
Upload less personal information on social hubs
Use anti-phishing feature in anti virus (Avast-Anti-
Phishing)
PROJECT BY HARSH & RAVI
Don’t click on unknown pop-ups
Frequently change your password
Use security features in email server and make mobile no. protection
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI

More Related Content

What's hot

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
cetechservices
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?
paula_bolivar
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
Molly Immendorf
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Celia Bandelier
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
Miguel Ibarra
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 

What's hot (20)

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
security procedures
security procedures
security procedures
security procedures
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 

Viewers also liked

โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์
noeiinoii
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar images
wilsonrd1987
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgon
Bernadette Gelsei
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016
Anatoliy Arkhipov
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013
Rakhi Tips Provider
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้ว
noeiinoii
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federation
Primary Care Commissioning (PCC)
 

Viewers also liked (15)

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to Philosophy
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
 
Paradigm created
Paradigm createdParadigm created
Paradigm created
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar images
 
September 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor NassiefSeptember 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor Nassief
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-November
 
INDOKON BETON INSTAN
INDOKON BETON INSTANINDOKON BETON INSTAN
INDOKON BETON INSTAN
 
Donation waiver authority and procedure
Donation waiver authority and procedureDonation waiver authority and procedure
Donation waiver authority and procedure
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgon
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-November
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้ว
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federation
 

Similar to FULL MEANING OF HACKING

Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
James Ruffer
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
sumit dimri
 

Similar to FULL MEANING OF HACKING (20)

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
security procedures
security procedures
security procedures
security procedures
 
Hack a Facebook password
Hack a Facebook passwordHack a Facebook password
Hack a Facebook password
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Password Attack
Password Attack Password Attack
Password Attack
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

FULL MEANING OF HACKING

  • 7. Hackers are the person who unkindly breaks into systems for personal gain. Technically, these criminals are crackers PROJECT BY HARSH & RAVI
  • 8. Black hats – highly skilled, malicious, destructive “crackers” White hats – skills used for defensive security analysts Gray hats – offensively and defensively; will hack for different reasons, depends on situation. PROJECT BY HARSH & RAVI
  • 9. Reset the Password Use a Key logger Command prompt (Linux based) Phishing PROJECT BY HARSH & RAVI
  • 10. The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack. Steps:-  The first step would be to get your friend's Facebook email login.  Next, enter victim's email then click on Forgotten your password?  It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?  It will now ask you a question.  If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three - five friends.  It will send them passwords. PROJECT BY HARSH & RAVI
  • 13. Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo , Gmail, MySpace etc. PROJECT BY HARSH & RAVI
  • 14. STEP1:- Go to facebook homepage the right it save webpage as HTML only by name “INDEX” STEP2:- create a notepad file for entering following code & saveas “next.php” STEP3:- create text file & save as “password” STEP4:- open INDEX file in notepad press ctrl+F search for action, now change webpage to next.php and save it STEP5:- go to www.************.com and log in to your account STEP6:- upload all the 3 file to website in public directory folder STEP7:- now ask the person to log in to dummy page of facebook as he log in its password would be mailed to id or saved to password.txt PROJECT BY HARSH & RAVI
  • 24.  Hacking is the most dangerous enemy of the company because most of the companies work is done through online.  If companies a/c or website is hacked then its all private data may be leaked and competitors may take advantages of that data.  Our company’s monopoly product is Faluda syrup all over Gujarat. So, after being hacked the secret ingredients of Faluda syrup may revealed. PROJECT BY HARSH & RAVI
  • 25. MAIN THREATS OF THE COMPANY AFTER BEING HACKED Account details Company details payment structures Secret ingredients of their products List of suppliers and its details List of bulk purchase customers and its details etc.. PROJECT BY HARSH & RAVI
  • 26. Use an email address specifically for your Facebook and don't put that email address on your profile. When choosing a security question and answer, make it difficult. Don’t log on an unknown/unsecured pc’s PROJECT BY HARSH & RAVI
  • 27. Don’t give access of professional a/c to any employees or any other person Try to access your professional a/c on your pcs or laptop only Upload less personal information on social hubs Use anti-phishing feature in anti virus (Avast-Anti- Phishing) PROJECT BY HARSH & RAVI
  • 28. Don’t click on unknown pop-ups Frequently change your password Use security features in email server and make mobile no. protection PROJECT BY HARSH & RAVI