Brief Introduction of Hackers


Published on

My First Slide in High School =D

1 Comment
1 Like
  • An Article about Hacking importance
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Brief Introduction of Hackers

  1. 1. Wesley Methodist School ICT 2006 Hackers Su Ning En 4M
  2. 2. Contents: <ul><li>Opening [slide 1] </li></ul><ul><li>Contents [slide 2] </li></ul><ul><li>Introduction on hacking [slide 3] </li></ul><ul><li>Different type Of Hacking [slide 4] </li></ul><ul><li>Requirements for Ethical Hackers [slide 5] </li></ul><ul><li>Criminals [slide 6] </li></ul><ul><li>Effects [slide7] </li></ul><ul><li>Prevention [slide 8] </li></ul><ul><li>Summary: Conclusion [slide 9] </li></ul><ul><li>Source of Information [slide 10] </li></ul>
  3. 3. Hacking: <ul><li>Hacking is unauthorized use of computer and network resources and also mean a very gifted programmer. </li></ul><ul><li>There are many definitions of hacking, as well as varying ideas of what a hacker is or does. Simply stated a hacker is any programming specialist who has the expertise to enter a computer or network without proper authorization. </li></ul>
  4. 4. Different Types of Hacking: <ul><li>The Criminal Hacker </li></ul><ul><li>Deface hacked web pages to advertise their prowess </li></ul><ul><li>Doings are evil and illegal </li></ul><ul><li>Work to get illegal information for themselves or for someone else </li></ul><ul><li>The Ethical Hacker </li></ul><ul><li>Hired as a preventive measure </li></ul><ul><li>Doings are good and justice </li></ul><ul><li>Ex. Breaking into the clients’ computing network to identify potential security lapses </li></ul>
  5. 5. Requirements for Ethical Hackers: <ul><li>One should possess good programming skills and computer networking skills; several experience in installing and maintaining popular operating systems-ex. UNIX/Linux and Windows NT </li></ul><ul><li>Good communications skills as ‘Social Engineering’ is used to test the client organizing staff security awareness to valuable information that may be obtained </li></ul><ul><li>Patience, Determination and Trustworthiness are vital between the ethical hacker and the client </li></ul>
  6. 6. Different types of Hacking Attacks: A simple attack but the result is impressive. A complicated attack, only the hacker understand. An attack that is against all rules. Hacking Attacks Simplicity Mastery Illicitness
  7. 7. Effects of Hacking: <ul><li>Individuals </li></ul><ul><li>- credit cards numbers may be stolen, the files in your computer is destroyed or missing </li></ul><ul><li>Organizations and Companies </li></ul><ul><li>bankruptcy, losing customers due to customer’s lack of confidence, software stolen, breaking the main system of the company causing the company' server to slow down </li></ul><ul><li>Countries </li></ul><ul><li>- Hackers are known to steal military intelligence, breaking the main system might cause the fall of all banks </li></ul>
  8. 8. Prevention: <ul><li>Website defacement attempts can be stopped by implementing sound computer security practices </li></ul><ul><li>To prevent hack attacks as much as possible is not using a default accounts, passwords on network devices-using strong passwords and changing them on a regular basis </li></ul><ul><li>Using an industry-standard security testing methodology is recommended. </li></ul>
  9. 9. Conclusion or Summary: <ul><li>In conclusion, Hackers are professionals when they were first known but when technology advance to a new stage from day to day, people became more interested in the cyber world. Thus, earning the hackers a bad name by hacking into other computers to demonstrate their strength. Following this path, hackers were then categories to several cases for criminals and ethical. </li></ul>
  10. 10. Source of Information: <ul><li>Star Newspaper - Friday 11 March 2005, pg 20 Nation ‘Hackers deface 45 local websites’ </li></ul><ul><li>Magazine - CoursesNow!ExploreIT! [published by gti] issue 8-2006-brought by </li></ul><ul><li>Internet Connection -, ,,290042,sid7_gci970601,00.html?bucket=REF </li></ul>