Your SlideShare is downloading. ×
0
hacking
hacking
hacking
hacking
hacking
hacking
hacking
hacking
hacking
hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

hacking

1,699

Published on

Published in: Real Estate
1 Comment
1 Like
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
1,699
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
51
Comments
1
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. HACKING (COMPUTER SECURITY) NAME GROUP AISHATUL ATIRAH BT THOMAS NURUL KHADIBA BT ARRIADYHACKING A technological threat
  2. HACKING  Hobby/profession of working with computers.  Breaking into computers  Gaining access
  3. TYPES OF HACKING  Website Hacking  Online banking Hacking  Computer Hacking
  4. WEBSITE HACKING  Main focus- Vulnerable loopholes  Collapses the information  Make changes in the information
  5. Computer Hacking • Steals information from pc • Remote desktop connection technique • Accessing other person’s files
  6. Online banking Hacking • Online banking disadvantages • Hackers create fake websites • Using proper website address
  7. ETHICAL HACKING  Computer or network expert  Seeking vulnerabilities  Victims – Official & Private websites
  8. Conclusion • Proper ethical hackers should be employed • Do not expose your passwords to untrusted sites • Practice using exact web address • Close your internet while not in use
  9. SOURCES OF REFERENCE En.wikipedia.org/wiki/Hacker_(computer_security) ^ S. Raymond, Eric.”Jargon File: Craker”. Retrieved 2010-05-08. “Coined ca. 1985 by hackers in defense against journalistic misuse of hacker” Icsd.i2r.a-star.edu.sg/staff/sethome/pdf.010.pdf
  10. THANK YOU

×