Your SlideShare is downloading. ×
Hacking-coffee and latte
Hacking-coffee and latte
Hacking-coffee and latte
Hacking-coffee and latte
Hacking-coffee and latte
Hacking-coffee and latte
Hacking-coffee and latte
Hacking-coffee and latte
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Hacking-coffee and latte

204

Published on

This is a refference for tmk form 4 student for assignment 3. It might be wrong.. Depends on your teacher... …

This is a refference for tmk form 4 student for assignment 3. It might be wrong.. Depends on your teacher...
p/s:Don't leave negative comments

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
204
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Presented by: Coffee and latte 4SC 7 Group member: -------------------------------------
  • 2. CONTENTS
  • 3. What does Hacker mean? • A hacker utilizes alternative system access methods to sabotage computer systems and networks. • Hacking actions are differentiated as illegal and unacceptable (black/grey hat hacking), or legal and acceptable (white hat hacking).
  • 4. EXPLANATION OF HACKERS • Hacker is a term that refers to many different computing topics. However, in the mainstream, a hacker is any individual or group that circumvents security to access unauthorized data. • Most hackers are highly skilled computer programmers that locate security gaps and access secure systems via unique analytical skills. A great hacker is known to be able to "think outside the box."
  • 5. • Hacker types are delineated according to intent, as follows: • Black hat hackers break into computer systems illegally and cause harm by stealing or destroying data, i.e., a banking system to steal money for personal gain. • White hat hackers use their skills to help enterprises create robust computer systems. • Grey hat hackers perform illegal hacking activities to show off their skills, rather than to achieve personal gain.
  • 6. What Are The Effects Of Computer Hacking? Why Do Hackers Attack Us? • For some, hacking may just be a hobby to see how many computers or networks they can crack. • For others, there is malicious intent behind their escapades, like stealing... • Client or customer information or other business data
  • 7. • Credit card details and social security numbers, for identity fraud or theft • Passwords for access to our online bank, ISP or web services • Email addresses, which may be used for spamming • Children's names, photographs, ages or other of their personal details held on the computer
  • 8. REFFERENCES =>HTTP://WWW.TECHOPEDIA.COM/ =>HTTP://WWW.GUARD-PRIVACYAND-ONLINE-SECURITY.COM/ =>HTTPS://WWW.GOOGLE.COM.MY/

×