TYPES OF HACKING

34,860 views
34,343 views

Published on

THE PROBLEMS THAT ARE FACED BY US DUE TO THE HACKERS....

0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
34,860
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
1,273
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

TYPES OF HACKING

  1. 1. Hacking A technological threat
  2. 2. Overview <ul><li>What is hacking </li></ul><ul><li>Types of hacking </li></ul><ul><li>Ethical hacking </li></ul><ul><li>Consequences </li></ul><ul><li>Conclusion </li></ul>
  3. 3. Hacking <ul><li>Hobby/profession of working with computers. </li></ul><ul><li>Breaking into computers </li></ul><ul><li>Gaining access </li></ul>
  4. 4. Types of Hacking <ul><li>Website Hacking </li></ul><ul><li>Email Hacking </li></ul><ul><li>Network Hacking </li></ul><ul><li>Password Hacking </li></ul><ul><li>Online banking Hacking </li></ul><ul><li>Computer Hacking </li></ul>
  5. 5. Website Hacking <ul><li>Main focus- Vulnerable loopholes </li></ul><ul><li>Collapses the information </li></ul><ul><li>Make changes in the information </li></ul>
  6. 6. Email Hacking <ul><li>Can Emails Be Hacked? </li></ul><ul><li>Store business data, private information </li></ul><ul><li>Serious precautions are not taken </li></ul>
  7. 7. Computer Hacking <ul><li>Steals information from pc </li></ul><ul><li>Remote desktop connection technique </li></ul><ul><li>Accessing other person’s files </li></ul>
  8. 8. Online banking Hacking <ul><li>Online banking disadvantages </li></ul><ul><li>Hackers create fake websites </li></ul><ul><li>Using proper website address </li></ul>
  9. 9. Ethical Hacking <ul><li>Computer or network expert </li></ul><ul><li>Seeking vulnerabilities </li></ul><ul><li>Victims – Official & Private websites </li></ul>
  10. 10. What do ethical hackers do? <ul><li>An ethical hacker’s evaluation of a system security seeks answers to these basic question: </li></ul><ul><ul><li>What can an intruder see on the target systems ? </li></ul></ul><ul><ul><li>What are you trying to protect ? </li></ul></ul><ul><ul><li>What can an intruder do with that information ? </li></ul></ul>
  11. 11. <ul><li>Thousands of dollars in fines </li></ul><ul><li>Imprisonment </li></ul><ul><li>Seizure of your computer </li></ul>Consequences
  12. 12. Conclusion <ul><li>Proper ethical hackers should be employed </li></ul><ul><li>Do not expose your passwords to untrusted sites </li></ul><ul><li>Practice using exact web address </li></ul><ul><li>Close your internet while not in use </li></ul>
  13. 13. Summary <ul><li>Hacking is of two types </li></ul><ul><li>There are several types of hacking </li></ul><ul><li>Ethical hacking – a legal method </li></ul><ul><li>Consequences of illegal hacking </li></ul>
  14. 14. Thank You

×