Your SlideShare is downloading. ×
  • Like


Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply


Published in Technology , News & Politics
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • 16% of people took a first name as a password, often their own or one of their children, according to the study published by Information Week. Another 14% relied on the easiest keyboard combination to remember such as “1234” or “12345678”. But there is a safer way.

    Are you sure you want to
    Your message goes here
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Hacking A technological threat
  • 2. Overview
    • What is hacking
    • Types of hacking
    • Ethical hacking
    • Consequences
    • Conclusion
  • 3. Hacking
    • Hobby/profession of working with computers.
    • Breaking into computers
    • Gaining access
  • 4. Types of Hacking
    • Website Hacking
    • Email Hacking
    • Network Hacking
    • Password Hacking
    • Online banking Hacking
    • Computer Hacking
  • 5. Website Hacking
    • Main focus- Vulnerable loopholes
    • Collapses the information
    • Make changes in the information
  • 6. Email Hacking
    • Can Emails Be Hacked?
    • Store business data, private information
    • Serious precautions are not taken
  • 7. Computer Hacking
    • Steals information from pc
    • Remote desktop connection technique
    • Accessing other person’s files
  • 8. Online banking Hacking
    • Online banking disadvantages
    • Hackers create fake websites
    • Using proper website address
  • 9. Ethical Hacking
    • Computer or network expert
    • Seeking vulnerabilities
    • Victims – Official & Private websites
  • 10. What do ethical hackers do?
    • An ethical hacker’s evaluation of a system security seeks answers to these basic question:
      • What can an intruder see on the target systems ?
      • What are you trying to protect ?
      • What can an intruder do with that information ?
  • 11.
    • Thousands of dollars in fines
    • Imprisonment
    • Seizure of your computer
  • 12. Conclusion
    • Proper ethical hackers should be employed
    • Do not expose your passwords to untrusted sites
    • Practice using exact web address
    • Close your internet while not in use
  • 13. Summary
    • Hacking is of two types
    • There are several types of hacking
    • Ethical hacking – a legal method
    • Consequences of illegal hacking
  • 14. Thank You