Your SlideShare is downloading. ×
hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

hacking

1,681
views

Published on

Published in: Real Estate

1 Comment
1 Like
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
1,681
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
50
Comments
1
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HACKING (COMPUTER SECURITY) NAME GROUP AISHATUL ATIRAH BT THOMAS NURUL KHADIBA BT ARRIADYHACKING A technological threat
  • 2. HACKING  Hobby/profession of working with computers.  Breaking into computers  Gaining access
  • 3. TYPES OF HACKING  Website Hacking  Online banking Hacking  Computer Hacking
  • 4. WEBSITE HACKING  Main focus- Vulnerable loopholes  Collapses the information  Make changes in the information
  • 5. Computer Hacking • Steals information from pc • Remote desktop connection technique • Accessing other person’s files
  • 6. Online banking Hacking • Online banking disadvantages • Hackers create fake websites • Using proper website address
  • 7. ETHICAL HACKING  Computer or network expert  Seeking vulnerabilities  Victims – Official & Private websites
  • 8. Conclusion • Proper ethical hackers should be employed • Do not expose your passwords to untrusted sites • Practice using exact web address • Close your internet while not in use
  • 9. SOURCES OF REFERENCE En.wikipedia.org/wiki/Hacker_(computer_security) ^ S. Raymond, Eric.”Jargon File: Craker”. Retrieved 2010-05-08. “Coined ca. 1985 by hackers in defense against journalistic misuse of hacker” Icsd.i2r.a-star.edu.sg/staff/sethome/pdf.010.pdf
  • 10. THANK YOU