SlideShare a Scribd company logo
1 of 17
HACKING
-
“HACKING”
-RAVI RAJ
-BCA-II(E)
-02821402017
CONTENTS
 HISTORY OF HACKING?
 WHAT IS HACKING?
 WHOIS HACKER ?
 WHYDO HACKERSHACK ?
 TYPESOF HACKING?
 ADVANTAGEOF HACKING?
 DISADVANTAGE OF HACKING?
 What shoulddo after hacked?
 howto secure our data ?
HISTORY OF HACKING
-> Hacking has been a part of computing for 40 years.
-> the first computer hacker emerged at mit.
-> hacking is beganin the 1960 at mit,originof the term“hacker”.
-> the truthhacker amongst our societies have thirst for the knowledge.
=> Boredomis never an objectof challenge for the hacker.
WHAT IS HACKING ???
-->> THE PROCESS OF ATTEMPTING TO GAIN OR
SUCESSFULLY GAINING,UNAUTHORIZED ACCESS
TO COMPUTER RESOURCES IS CALLED “HACKING”.
who is hacker…???
In the computer security context, a hacker is someone who Seeks and
exploits weaknesses in a computer system or computer network.
The term hacker is reclaimed by computer programmers who argue that
someone breaking into computers is better called a cracker.
WHY DO HACKERS HACK…???
JUST FOR FUN.
SHOW OFF.
HACK OTHER SYSTEM SECERETLY.
NOTIFY MANY PEOPLE THEIR THEIR THOUGHT.
STEAL IMPORTANT INFORMATION.
DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
TYPES OF HACKING…???
WEBSITE HACKING
NETWORK HACKING
ETHICAL HACKING
EMAIL HACKING
PASSWORD HACKING
ONLINE BANKING HACKING
COMPUTER HACKING
Website hacking-> Hacking a website means taking control from the website owner to a person who hacks the website.
Network Hacking-> Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look
UP, Ping, Tracert, Netstat, etc… over the network.
Ethical Hacking->Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
Email Hacking-> Email hacking is illicit access to an email account or email correspondence.
Password Hacking-> Password Hacking Password cracking is the process of recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Online Banking Hacking->Online banking Hacking Unauthorized accessing bank accounts without knowing the password or
without permission of account holder is known as Online banking hacking.
Computer Hacking-> Computer Hacking is when files on your computer are viewed, created, or edited without your
authorization.
FAMOUS HACKERS IN HISTORY
ADVANTAGE OF HACKING…
CAN BE USED TO RECOVER LOST INFORMATION WHERE THE
COMPUTER PASSWORD HAS BEEN LOST.
TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE.
TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK.
THEY CALL IT WHITE HAT COMPUTER HACKER.
DISADVANATAGES OF HACKING
CRIMINALS CAN USE IT TO THEIR ADVANTAGE.
IT CAN HARM SOMEONE’S PRIVACY.
IT’S ILLEGAL
IT CAN HARM YOUR IMPORTANT DATAS.
WHAT SHOULD DO AFTER HACKED ?
Shut down the system OR turn oFf the system.
Separate the system from network.
Restore the system with backup OR reinstall all programs.
Connect the system to the network.
It can be good to call the cops.
HOW TO GIVE A PASSWORD TO ACCOUNT.
Use unique password for your all the personal accounts.
Choose a combination of letters, numbers
OR symbols to create
“UNIQUE PASSWORD”
CONCLUSION
Keep your password protected. Write your password should be with combination of characters, digits,
special symbols. Do not respond to feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there is a lock symbol .
THANK
YOU
.

More Related Content

What's hot

P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?Alejandro Correa Bahnsen, PhD
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken MalwareSecurityMetrics
 
Joseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasJoseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasIT Arena
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsSecurityMetrics
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityNeil Parker
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the webViral Parmar
 

What's hot (20)

P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Aiman
AimanAiman
Aiman
 
Antikeylogger
AntikeyloggerAntikeylogger
Antikeylogger
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken Malware
 
Joseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasJoseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped Christmas
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit Cards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 

Similar to Hacking

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackersbalti13
 

Similar to Hacking (20)

Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking final
Hacking finalHacking final
Hacking final
 
HACKING
HACKINGHACKING
HACKING
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Hacking

  • 3. CONTENTS  HISTORY OF HACKING?  WHAT IS HACKING?  WHOIS HACKER ?  WHYDO HACKERSHACK ?  TYPESOF HACKING?  ADVANTAGEOF HACKING?  DISADVANTAGE OF HACKING?  What shoulddo after hacked?  howto secure our data ?
  • 4. HISTORY OF HACKING -> Hacking has been a part of computing for 40 years. -> the first computer hacker emerged at mit. -> hacking is beganin the 1960 at mit,originof the term“hacker”. -> the truthhacker amongst our societies have thirst for the knowledge. => Boredomis never an objectof challenge for the hacker.
  • 5. WHAT IS HACKING ??? -->> THE PROCESS OF ATTEMPTING TO GAIN OR SUCESSFULLY GAINING,UNAUTHORIZED ACCESS TO COMPUTER RESOURCES IS CALLED “HACKING”.
  • 6. who is hacker…??? In the computer security context, a hacker is someone who Seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 7. WHY DO HACKERS HACK…??? JUST FOR FUN. SHOW OFF. HACK OTHER SYSTEM SECERETLY. NOTIFY MANY PEOPLE THEIR THEIR THOUGHT. STEAL IMPORTANT INFORMATION. DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
  • 8. TYPES OF HACKING…??? WEBSITE HACKING NETWORK HACKING ETHICAL HACKING EMAIL HACKING PASSWORD HACKING ONLINE BANKING HACKING COMPUTER HACKING
  • 9. Website hacking-> Hacking a website means taking control from the website owner to a person who hacks the website. Network Hacking-> Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network. Ethical Hacking->Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. Email Hacking-> Email hacking is illicit access to an email account or email correspondence. Password Hacking-> Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Online Banking Hacking->Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking. Computer Hacking-> Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 10. FAMOUS HACKERS IN HISTORY
  • 11. ADVANTAGE OF HACKING… CAN BE USED TO RECOVER LOST INFORMATION WHERE THE COMPUTER PASSWORD HAS BEEN LOST. TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE. TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK. THEY CALL IT WHITE HAT COMPUTER HACKER.
  • 12. DISADVANATAGES OF HACKING CRIMINALS CAN USE IT TO THEIR ADVANTAGE. IT CAN HARM SOMEONE’S PRIVACY. IT’S ILLEGAL IT CAN HARM YOUR IMPORTANT DATAS.
  • 13. WHAT SHOULD DO AFTER HACKED ? Shut down the system OR turn oFf the system. Separate the system from network. Restore the system with backup OR reinstall all programs. Connect the system to the network. It can be good to call the cops.
  • 14. HOW TO GIVE A PASSWORD TO ACCOUNT. Use unique password for your all the personal accounts. Choose a combination of letters, numbers OR symbols to create “UNIQUE PASSWORD”
  • 15. CONCLUSION Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .
  • 16.