0
HACKING (COMPUTER SECURITY)        NAME GROUP AISHATUL ATIRAH BT THOMAS NURUL KHADIBA BT ARRIADYHACKING                   ...
HACKING     Hobby/profession of working with computers.     Breaking into computers     Gaining access
TYPES OF HACKING       Website Hacking       Online banking Hacking       Computer Hacking
WEBSITE HACKING         Main focus- Vulnerable loopholes         Collapses the information         Make changes in the ...
Computer Hacking    • Steals information from pc    • Remote desktop connection technique    • Accessing other person’s fi...
Online banking Hacking    • Online banking disadvantages    • Hackers create fake websites    • Using proper website address
ETHICAL HACKING           Computer or network expert           Seeking vulnerabilities           Victims – Official & P...
Conclusion  • Proper ethical hackers should be employed  • Do not expose your passwords to untrusted sites  • Practice usi...
SOURCES OF REFERENCE En.wikipedia.org/wiki/Hacker_(computer_security) ^ S. Raymond, Eric.”Jargon File: Craker”.  Retriev...
THANK YOU
Upcoming SlideShare
Loading in...5
×

hacking

1,701

Published on

Published in: Real Estate
1 Comment
1 Like
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
1,701
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
51
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "hacking"

  1. 1. HACKING (COMPUTER SECURITY) NAME GROUP AISHATUL ATIRAH BT THOMAS NURUL KHADIBA BT ARRIADYHACKING A technological threat
  2. 2. HACKING  Hobby/profession of working with computers.  Breaking into computers  Gaining access
  3. 3. TYPES OF HACKING  Website Hacking  Online banking Hacking  Computer Hacking
  4. 4. WEBSITE HACKING  Main focus- Vulnerable loopholes  Collapses the information  Make changes in the information
  5. 5. Computer Hacking • Steals information from pc • Remote desktop connection technique • Accessing other person’s files
  6. 6. Online banking Hacking • Online banking disadvantages • Hackers create fake websites • Using proper website address
  7. 7. ETHICAL HACKING  Computer or network expert  Seeking vulnerabilities  Victims – Official & Private websites
  8. 8. Conclusion • Proper ethical hackers should be employed • Do not expose your passwords to untrusted sites • Practice using exact web address • Close your internet while not in use
  9. 9. SOURCES OF REFERENCE En.wikipedia.org/wiki/Hacker_(computer_security) ^ S. Raymond, Eric.”Jargon File: Craker”. Retrieved 2010-05-08. “Coined ca. 1985 by hackers in defense against journalistic misuse of hacker” Icsd.i2r.a-star.edu.sg/staff/sethome/pdf.010.pdf
  10. 10. THANK YOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×