HackingAuthorized or unauthorizedattempts to bypass thesecurity mechanisms of aninformation system ornetwork.
Who is a “HACKER” ? A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
Types of Hackers
The good guys who identify the security weakness of the system or network and inform the owner about them.
◦ A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3th1s wh3|| 1 h4ck3d 1nI did not hack this page, it was likethis when I hacked in.
To make security stronger ( Ethical Hacking ). Just for fun. Hack other systems secretly. Steal important information. Destroy enemy’s computer network.
ETHICAL HACKING This is a positive approach of hacking. In this type of hacking company’s own software engineers Hack into its server and crack its password. If the password is cracked one time nobody can crack it again so the server is kept secured.
World’s famous hackers• Stephen Wozniac• Tsutomu Shimomura
World’s famous hackers• Kevin Mitnick• Kevin Poulsen
Cybercrime in World
Did you know ? Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents. The average age group of hackers are aged between 14-24 yrs. …
Preventivemeasures Install a strong anti-virus software. Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers.
Thank You PRESENTED BY D H RU M I L K H A T R I . V I R A L C H H A T BA R . R I S H I T C H AU H A N . NA K U L K A NA R . MIRAJ THACKER.