SlideShare a Scribd company logo
1 of 14
Hacking
-the art of deceiving
• History of Hacking
• What is Hacking?
• Who is a Hacker?
• Hacker Types
• Hacking Techniques
• Major Hackers in the history
• Major hacks happened around world
• Advantages
• Disadvantages
• How to secure our data?
Contents
History
 The very first hack came in 1878 at
Bell Telephone.
 Started in 1960, at MIT.
 Hacking increased due to invention
of UNIX.
What is Hacking?
 Act of finding the possible entry points that
exist in a computer or in a network and finally
entering into them.
 Usually done to gain unauthorized access to a
computer to harm the systems or to steal sensitive
information available on the computer.
 In the computer security context, a hacker is
someone who seeks and exploit weakness in a
computer or in a network.
 The term hackers is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a CRACKER.
Who is a Hacker?
Hacker Types
o Black Hat Hackers
o Grey Hat Hackers
o White Hat Hackers
Hacking Techniques
 Bait and switch
 Click Jacking Attacks
 Eavesdropping (Passive Attacks)
 Fake WAP
 Waterhole attacks
 Phishing
 Denial of Service (DoSDDoS)
 Key Logger
 Ransom Ware
Major Hackers in the history
Gary
McKinnon
Samy
Kamkar
Kevin
Mitnick
Linus
Torvalds
Major hacks happened around world
Ransom ware Attack on 12 May 2017
Mark Zuckerberg's Facebook page hacked by
Khalil Shreateh
Advantages
 Testing security measures
 Detects bugs and weakness in software
 Allow nations to spy on other nations
 Hackers helped make your PC
 Can make you a good programmer
 Recovering lost information
Disadvantages
 Illegal
 Can harm someone’s privacy
 Criminals use it to their advantage
 Unauthorized access to private
information isn’t good
How to secure our data?
 Keep Your Firewall Turned On
 Install or Update Your Antivirus Software
 Keep Your Operating System Up to Date
 Be Careful What You Download
 Create unique passwords
 Do not use open Wi-Fi
if ( anyQuestions == 1 ){
ask();
}
else {
Printf(“ <ThankYou/> ”);
}

More Related Content

What's hot

Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Final ppt
Final pptFinal ppt
Final ppt
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Internet security
Internet securityInternet security
Internet security
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.Wikileaks release trove of alleged CIA documents.
Wikileaks release trove of alleged CIA documents.
 

Similar to Hacking

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 

Similar to Hacking (20)

Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
hacking
hackinghacking
hacking
 
Hacking
Hacking Hacking
Hacking
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 

Hacking

  • 2. • History of Hacking • What is Hacking? • Who is a Hacker? • Hacker Types • Hacking Techniques • Major Hackers in the history • Major hacks happened around world • Advantages • Disadvantages • How to secure our data? Contents
  • 3. History  The very first hack came in 1878 at Bell Telephone.  Started in 1960, at MIT.  Hacking increased due to invention of UNIX.
  • 4. What is Hacking?  Act of finding the possible entry points that exist in a computer or in a network and finally entering into them.  Usually done to gain unauthorized access to a computer to harm the systems or to steal sensitive information available on the computer.
  • 5.  In the computer security context, a hacker is someone who seeks and exploit weakness in a computer or in a network.  The term hackers is reclaimed by computer programmers who argue that someone breaking into computers is better called a CRACKER. Who is a Hacker?
  • 6. Hacker Types o Black Hat Hackers o Grey Hat Hackers o White Hat Hackers
  • 7. Hacking Techniques  Bait and switch  Click Jacking Attacks  Eavesdropping (Passive Attacks)  Fake WAP  Waterhole attacks  Phishing  Denial of Service (DoSDDoS)  Key Logger  Ransom Ware
  • 8. Major Hackers in the history Gary McKinnon Samy Kamkar Kevin Mitnick Linus Torvalds
  • 9. Major hacks happened around world Ransom ware Attack on 12 May 2017
  • 10. Mark Zuckerberg's Facebook page hacked by Khalil Shreateh
  • 11. Advantages  Testing security measures  Detects bugs and weakness in software  Allow nations to spy on other nations  Hackers helped make your PC  Can make you a good programmer  Recovering lost information
  • 12. Disadvantages  Illegal  Can harm someone’s privacy  Criminals use it to their advantage  Unauthorized access to private information isn’t good
  • 13. How to secure our data?  Keep Your Firewall Turned On  Install or Update Your Antivirus Software  Keep Your Operating System Up to Date  Be Careful What You Download  Create unique passwords  Do not use open Wi-Fi
  • 14. if ( anyQuestions == 1 ){ ask(); } else { Printf(“ <ThankYou/> ”); }