This is ppt was prepared by referring more than 4 ppts
It includes all the details about the hacking and most you cant get from internet
Because i get something threw doing things on my system
All the information are said here is absolutely true
the viewers are consent to use this ppt
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Hacking 2018
1. The Chinese Search
Engine• Baidu is the dominant Chinese internet search engine company, and it is
the equivalent to Google in the United States.
• Baidu, Inc. was incorporated on 18 January, 2000 and was created by Robin
Li and Eric Xu.
• Baidu.com is the second most popular but a Chinese language search
engine with nearly 10% usage share in searches.
• Baidu is similar to Google and offers similar products and services, but the
focus is China where it controls most of the search market.
• Baidu censors search results and other content in accordance with Chinese
regulations. Hackesh
3. • What is Hacking
• History of Hacking
• Who is Hacker
• Types of Hackers
• Why do Hackers hack?
• Famous hackers in history
• Types of Hacking
• How to give a password to account
• What should do after hacked
• How to secure our data
• Advantages of Hacking
• Disadvantages of Hacking
• Conclusion Hackesh
4. • Hacking is usually done to gain unauthorized access
to a computer system or a computer network, either
to harm the systems or to steal sensitive information
available on the computer
• Hacking is usually legal as long as it is being done to find
weaknesses in a computer or network system for testing
purpose.
• This sort of hacking is what we call Ethical Hacking
Hackesh
5. • In 1988 a "worm program" written by a college
student shut down about 10 percent of computers
connected to the Internet.
• This was the beginning of the era of cyber attacks.
• Today we have about 10,000 incidents of cyber
attacks which are reported and the number grows.
Hackesh
6. • A Hacker is a person who finds and exploits weakness in
computer systems to gain access
• First -> Cracker
• A hacker is a Person who thinks outside the box
• A hacker is a person who discover unknowns features and
properties in a computer or in a computer network
• A hacker is a person who is highly creative and dedicated to
knowledge
• All hackers are not criminals that depends on their work
Hackesh
9. • Hacking a website means taking unauthorized control over a
web server and its associated software such as databases and
other interfaces.
• Hacking a website is getting the password to add, edit, delete
data stored in that website.
• After the attack done by a hacker, if he has changed the
password of that website software, then it will be tough for
theWebmaster to get it back.
• Hacker will insert harmful programs by inserting malicious
codes into the website. It will also cause to the website server
to be slow.
Hackesh
10. • Hacking on computer network is often done through
scripts and other network software.
• These specially-designed software programs generally
manipulate data passing through a network connection in
ways designed to obtain more information about how the
target system works
• Worms
• DOS
• RAT
• Trojans Hackesh
11. • This is the process of recovering secret passwords from data
that has been stored in or transmitted by a computer system.
• Find a valid user ID
• Create a list of possible passwords
• Rank the passwords from high probability to low
• They will type in each password with the help of Crunch tool
• DictionaryAttack
• Brute force Attack
Hackesh
12. • It includes getting unauthorized access on an Email account
and using it without taking the consent of its owner.
• While there exists many nasty websites on the internet that
mislead people with fake methods and false promises to
obtain passwords, some often present readers with obsolete
methods that can no longer be used.
• key logging
• Phishing
Hackesh
13. • Ethical hacking involves finding weaknesses in a computer or network system
for testing purpose and finally getting them fixed.
• Ethical Hacking sometimes called as PenetrationTesting is an act of
intruding/penetrating into system or networks to find out threats,
• vulnerabilities in those systems which a malicious attacker may find and exploit
causing loss of data, financial loss or other major damages.
• The purpose of ethical hacking is to improve the security of the network or
systems by fixing the vulnerabilities found during testing.
• Ethical hackers may use the same methods and tools used by the malicious
hackers but with the permission of the authorized person for the purpose of
improving the security and defending the systems from attacks by malicious
users.
• Ethical hackers are expected to report all the vulnerabilities and weakness found
during the process to the management.Hackesh
14. • This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized
access to a computer system.
• The Practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s
original purpose.
• To be accused of hacking, it must be proven that someone
gained access to the computer, intending to hack It
without permission.
Hackesh
15. • When you use your credit or debit card to bank online or
make any kind of electronic financial transaction, you are in
a risk that your personal information or money could be
stolen
• Especially now when are doing online shopping almost
daily, this threats almost each one of us.
• Threw PHISHING
• TROJANVirus to steal information key Logger
• SESSION Hijacking threwWi-Fi redirect the path
Hackesh
16. • Mobile hacking is the practice of manipulating or gaining
unauthorized access to mobile phones, such as by
intercepting telephone calls or accessing voicemail message.
• When the unauthorized access is to the phone user’s
conversation, it is more commonly, it is more commonly
referred to as phone tapping.
• RAT- Remote AdministrativeTool
• Key logging
• Spyware
• Unwanted application
Hackesh
17. • Venting anger at a company or organization
• Terrorism
• Financial Gain
• For fun
Hackesh
18. • Can used to recover lost information where the
computer password has been lost.
• Teaches you that no technology is 100% secure.
• To test how good security is on your own network.
• They call it white hat computer hacking.
Hackesh
19. • Criminal can use it to their advantage.
• It can harm someone's privacy
• It's Illegal
Hackesh
20. • Keep your password protected.
• Write your password should be with combination of
characters, digits, special symbols.
• Do not respond to feck on fishing email.
• when you are doing any online transection always
keep watch on site whether the protocol of site is
https & whether there is a lock symbol .
Hackesh