Your SlideShare is downloading. ×
0
hacking
hacking
hacking
hacking
hacking
hacking
hacking
hacking
hacking
hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

hacking

1,697

Published on

Published in: Real Estate
1 Comment
1 Like
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
1,697
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
51
Comments
1
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HACKING (COMPUTER SECURITY) NAME GROUP AISHATUL ATIRAH BT THOMAS NURUL KHADIBA BT ARRIADYHACKING A technological threat
  • 2. HACKING  Hobby/profession of working with computers.  Breaking into computers  Gaining access
  • 3. TYPES OF HACKING  Website Hacking  Online banking Hacking  Computer Hacking
  • 4. WEBSITE HACKING  Main focus- Vulnerable loopholes  Collapses the information  Make changes in the information
  • 5. Computer Hacking • Steals information from pc • Remote desktop connection technique • Accessing other person’s files
  • 6. Online banking Hacking • Online banking disadvantages • Hackers create fake websites • Using proper website address
  • 7. ETHICAL HACKING  Computer or network expert  Seeking vulnerabilities  Victims – Official & Private websites
  • 8. Conclusion • Proper ethical hackers should be employed • Do not expose your passwords to untrusted sites • Practice using exact web address • Close your internet while not in use
  • 9. SOURCES OF REFERENCE En.wikipedia.org/wiki/Hacker_(computer_security) ^ S. Raymond, Eric.”Jargon File: Craker”. Retrieved 2010-05-08. “Coined ca. 1985 by hackers in defense against journalistic misuse of hacker” Icsd.i2r.a-star.edu.sg/staff/sethome/pdf.010.pdf
  • 10. THANK YOU

×