Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Hacking

on

  • 3,626 views

 

Statistics

Views

Total Views
3,626
Slideshare-icon Views on SlideShare
3,626
Embed Views
0

Actions

Likes
1
Downloads
153
Comments
1

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • 16% of people took a first name as a password, often their own or one of their children, according to the study published by Information Week. Another 14% relied on the easiest keyboard combination to remember such as “1234” or “12345678”. But there is a safer way.

    Check www.smartsignin.com
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hacking Hacking Presentation Transcript

    • Hacking A technological threat
    • Overview
      • What is hacking
      • Types of hacking
      • Ethical hacking
      • Consequences
      • Conclusion
    • Hacking
      • Hobby/profession of working with computers.
      • Breaking into computers
      • Gaining access
    • Types of Hacking
      • Website Hacking
      • Email Hacking
      • Network Hacking
      • Password Hacking
      • Online banking Hacking
      • Computer Hacking
    • Website Hacking
      • Main focus- Vulnerable loopholes
      • Collapses the information
      • Make changes in the information
    • Email Hacking
      • Can Emails Be Hacked?
      • Store business data, private information
      • Serious precautions are not taken
    • Computer Hacking
      • Steals information from pc
      • Remote desktop connection technique
      • Accessing other person’s files
    • Online banking Hacking
      • Online banking disadvantages
      • Hackers create fake websites
      • Using proper website address
    • Ethical Hacking
      • Computer or network expert
      • Seeking vulnerabilities
      • Victims – Official & Private websites
    • What do ethical hackers do?
      • An ethical hacker’s evaluation of a system security seeks answers to these basic question:
        • What can an intruder see on the target systems ?
        • What are you trying to protect ?
        • What can an intruder do with that information ?
      • Thousands of dollars in fines
      • Imprisonment
      • Seizure of your computer
      Consequences
    • Conclusion
      • Proper ethical hackers should be employed
      • Do not expose your passwords to untrusted sites
      • Practice using exact web address
      • Close your internet while not in use
    • Summary
      • Hacking is of two types
      • There are several types of hacking
      • Ethical hacking – a legal method
      • Consequences of illegal hacking
    • Thank You