SlideShare a Scribd company logo
1 of 4
Download to read offline
ASSIGNMENT
Anushamol R A
Roll no.28
Physical science
HACKING
History of Hacking
❖ Hacking has been a part of computing for 40 years.
❖ The first computer hacker emerged at MIT .
❖ Hacking is began in the 1960 at MIT, origin of the term
‘hacker’.
❖ The truth hacker amongst our societies have thirst for the
knowledge .
❖ Boredom is never an object of challenge for the hacker .
What is Hacking ?
The process of attempting to gain or successfully
gaining , unauthorized access to computer is called Hacking .
Who is a Hacker ?
❖ In the computer security context , a hacker is some one who
seeks and exploits weakness in a computer system or
computer network .
❖ The term hacker is reclaimed by computer programmers who
argue that some one breaking into computers is better called
a cracker.
Why do hackers hack ?
❖ Just for fun.
❖ Show off .
❖ Hack other systems secretly .
❖ Notify many people their thought .
❖ Steal important information .
❖ Destroy enemy’s computer network during the war .
Types of Hacking
❖ Website Hacking
❖ Network Hacking
❖ Ethical Hacking
❖ Email Hacking
❖ Password Hacking
❖ Online banking Hacking
❖ Computer Hacking
1.Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website .
2. Network Hacking
Network hacking is generally means gathering
information about domain by using tools like Telnet , Ns
Lookup , ping , Tracert , Net stat etc…. Over the network .
3.Ethical Hacking
Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them .
4.Email Hacking
Email hacking is illicit access to an email account
or email correspondence .
5.Password Hacking
Password hacking is the process of recovering secret
passwords from data that has been stored in or transmitted
by a computer system .
6.Online Banking Hacking
Online Banking hacking unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online Banking
Hacking .
7.Computer Hacking
Computer hacking is when files on your computer are viewed ,
created , or edited without your authorization .
Advantages of Hacking
❖ Can be used to recover lost information where the
computer passwords has been lost .
❖ Teaches you that no technology is 100% secure .
❖ To test how good security is on your own network.
❖ They call it white hat computer hacking .
Disadvantages of Hacking
❖ Criminals can use it to their advantage .
❖ It can harm someone’s privacy .
❖ It is illegal .

More Related Content

What's hot (20)

Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Hackers
HackersHackers
Hackers
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to Hacking

Similar to Hacking (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
Hacking Hacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 

More from ANUSHAMOL2

Factors influencing for social change
Factors influencing for social change Factors influencing for social change
Factors influencing for social change ANUSHAMOL2
 
Factors influencing for the social change
Factors influencing for the social change Factors influencing for the social change
Factors influencing for the social change ANUSHAMOL2
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.pptANUSHAMOL2
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.pptANUSHAMOL2
 
Netiquette - Anushamol.pdf
Netiquette - Anushamol.pdfNetiquette - Anushamol.pdf
Netiquette - Anushamol.pdfANUSHAMOL2
 
Factors influencing Social change
Factors influencing Social change Factors influencing Social change
Factors influencing Social change ANUSHAMOL2
 

More from ANUSHAMOL2 (14)

9 B.pptx
9 B.pptx9 B.pptx
9 B.pptx
 
9 B.pptx
9 B.pptx9 B.pptx
9 B.pptx
 
Factors influencing for social change
Factors influencing for social change Factors influencing for social change
Factors influencing for social change
 
Factors influencing for the social change
Factors influencing for the social change Factors influencing for the social change
Factors influencing for the social change
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
Netiquette - Anushamol.pdf
Netiquette - Anushamol.pdfNetiquette - Anushamol.pdf
Netiquette - Anushamol.pdf
 
Factors influencing Social change
Factors influencing Social change Factors influencing Social change
Factors influencing Social change
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
Netiquette   Netiquette
Netiquette
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 

Recently uploaded

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Hacking

  • 1. ASSIGNMENT Anushamol R A Roll no.28 Physical science
  • 2. HACKING History of Hacking ❖ Hacking has been a part of computing for 40 years. ❖ The first computer hacker emerged at MIT . ❖ Hacking is began in the 1960 at MIT, origin of the term ‘hacker’. ❖ The truth hacker amongst our societies have thirst for the knowledge . ❖ Boredom is never an object of challenge for the hacker . What is Hacking ? The process of attempting to gain or successfully gaining , unauthorized access to computer is called Hacking . Who is a Hacker ? ❖ In the computer security context , a hacker is some one who seeks and exploits weakness in a computer system or computer network . ❖ The term hacker is reclaimed by computer programmers who argue that some one breaking into computers is better called a cracker. Why do hackers hack ? ❖ Just for fun. ❖ Show off . ❖ Hack other systems secretly . ❖ Notify many people their thought . ❖ Steal important information . ❖ Destroy enemy’s computer network during the war . Types of Hacking
  • 3. ❖ Website Hacking ❖ Network Hacking ❖ Ethical Hacking ❖ Email Hacking ❖ Password Hacking ❖ Online banking Hacking ❖ Computer Hacking 1.Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website . 2. Network Hacking Network hacking is generally means gathering information about domain by using tools like Telnet , Ns Lookup , ping , Tracert , Net stat etc…. Over the network . 3.Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them . 4.Email Hacking Email hacking is illicit access to an email account or email correspondence . 5.Password Hacking Password hacking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system . 6.Online Banking Hacking Online Banking hacking unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online Banking Hacking .
  • 4. 7.Computer Hacking Computer hacking is when files on your computer are viewed , created , or edited without your authorization . Advantages of Hacking ❖ Can be used to recover lost information where the computer passwords has been lost . ❖ Teaches you that no technology is 100% secure . ❖ To test how good security is on your own network. ❖ They call it white hat computer hacking . Disadvantages of Hacking ❖ Criminals can use it to their advantage . ❖ It can harm someone’s privacy . ❖ It is illegal .