SlideShare a Scribd company logo
1 of 4
Download to read offline
ASSIGNMENT
Anushamol R A
Roll no.28
Physical science
HACKING
History of Hacking
❖ Hacking has been a part of computing for 40 years.
❖ The first computer hacker emerged at MIT .
❖ Hacking is began in the 1960 at MIT, origin of the term
‘hacker’.
❖ The truth hacker amongst our societies have thirst for the
knowledge .
❖ Boredom is never an object of challenge for the hacker .
What is Hacking ?
The process of attempting to gain or successfully
gaining , unauthorized access to computer is called Hacking .
Who is a Hacker ?
❖ In the computer security context , a hacker is some one who
seeks and exploits weakness in a computer system or
computer network .
❖ The term hacker is reclaimed by computer programmers who
argue that some one breaking into computers is better called
a cracker.
Why do hackers hack ?
❖ Just for fun.
❖ Show off .
❖ Hack other systems secretly .
❖ Notify many people their thought .
❖ Steal important information .
❖ Destroy enemy’s computer network during the war .
Types of Hacking
❖ Website Hacking
❖ Network Hacking
❖ Ethical Hacking
❖ Email Hacking
❖ Password Hacking
❖ Online banking Hacking
❖ Computer Hacking
1.Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website .
2. Network Hacking
Network hacking is generally means gathering
information about domain by using tools like Telnet , Ns
Lookup , ping , Tracert , Net stat etc…. Over the network .
3.Ethical Hacking
Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them .
4.Email Hacking
Email hacking is illicit access to an email account
or email correspondence .
5.Password Hacking
Password hacking is the process of recovering secret
passwords from data that has been stored in or transmitted
by a computer system .
6.Online Banking Hacking
Online Banking hacking unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online Banking
Hacking .
7.Computer Hacking
Computer hacking is when files on your computer are viewed ,
created , or edited without your authorization .
Advantages of Hacking
❖ Can be used to recover lost information where the
computer passwords has been lost .
❖ Teaches you that no technology is 100% secure .
❖ To test how good security is on your own network.
❖ They call it white hat computer hacking .
Disadvantages of Hacking
❖ Criminals can use it to their advantage .
❖ It can harm someone’s privacy .
❖ It is illegal .

More Related Content

What's hot (20)

Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Hackers
HackersHackers
Hackers
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to Hacking

Similar to Hacking (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
Hacking Hacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 

More from ANUSHAMOL2

Factors influencing for social change
Factors influencing for social change Factors influencing for social change
Factors influencing for social change ANUSHAMOL2
 
Factors influencing for the social change
Factors influencing for the social change Factors influencing for the social change
Factors influencing for the social change ANUSHAMOL2
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.pptANUSHAMOL2
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.pptANUSHAMOL2
 
Netiquette - Anushamol.pdf
Netiquette - Anushamol.pdfNetiquette - Anushamol.pdf
Netiquette - Anushamol.pdfANUSHAMOL2
 
Factors influencing Social change
Factors influencing Social change Factors influencing Social change
Factors influencing Social change ANUSHAMOL2
 

More from ANUSHAMOL2 (14)

9 B.pptx
9 B.pptx9 B.pptx
9 B.pptx
 
9 B.pptx
9 B.pptx9 B.pptx
9 B.pptx
 
Factors influencing for social change
Factors influencing for social change Factors influencing for social change
Factors influencing for social change
 
Factors influencing for the social change
Factors influencing for the social change Factors influencing for the social change
Factors influencing for the social change
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette - Anushamol.pdf
Netiquette - Anushamol.pdfNetiquette - Anushamol.pdf
Netiquette - Anushamol.pdf
 
Factors influencing Social change
Factors influencing Social change Factors influencing Social change
Factors influencing Social change
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
Netiquette   Netiquette
Netiquette
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Hacking

  • 1. ASSIGNMENT Anushamol R A Roll no.28 Physical science
  • 2. HACKING History of Hacking ❖ Hacking has been a part of computing for 40 years. ❖ The first computer hacker emerged at MIT . ❖ Hacking is began in the 1960 at MIT, origin of the term ‘hacker’. ❖ The truth hacker amongst our societies have thirst for the knowledge . ❖ Boredom is never an object of challenge for the hacker . What is Hacking ? The process of attempting to gain or successfully gaining , unauthorized access to computer is called Hacking . Who is a Hacker ? ❖ In the computer security context , a hacker is some one who seeks and exploits weakness in a computer system or computer network . ❖ The term hacker is reclaimed by computer programmers who argue that some one breaking into computers is better called a cracker. Why do hackers hack ? ❖ Just for fun. ❖ Show off . ❖ Hack other systems secretly . ❖ Notify many people their thought . ❖ Steal important information . ❖ Destroy enemy’s computer network during the war . Types of Hacking
  • 3. ❖ Website Hacking ❖ Network Hacking ❖ Ethical Hacking ❖ Email Hacking ❖ Password Hacking ❖ Online banking Hacking ❖ Computer Hacking 1.Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website . 2. Network Hacking Network hacking is generally means gathering information about domain by using tools like Telnet , Ns Lookup , ping , Tracert , Net stat etc…. Over the network . 3.Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them . 4.Email Hacking Email hacking is illicit access to an email account or email correspondence . 5.Password Hacking Password hacking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system . 6.Online Banking Hacking Online Banking hacking unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online Banking Hacking .
  • 4. 7.Computer Hacking Computer hacking is when files on your computer are viewed , created , or edited without your authorization . Advantages of Hacking ❖ Can be used to recover lost information where the computer passwords has been lost . ❖ Teaches you that no technology is 100% secure . ❖ To test how good security is on your own network. ❖ They call it white hat computer hacking . Disadvantages of Hacking ❖ Criminals can use it to their advantage . ❖ It can harm someone’s privacy . ❖ It is illegal .