Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

TYPES OF HACKING

53,277 views

Published on

THE PROBLEMS THAT ARE FACED BY US DUE TO THE HACKERS....

TYPES OF HACKING

  1. 1. Hacking A technological threat
  2. 2. Overview <ul><li>What is hacking </li></ul><ul><li>Types of hacking </li></ul><ul><li>Ethical hacking </li></ul><ul><li>Consequences </li></ul><ul><li>Conclusion </li></ul>
  3. 3. Hacking <ul><li>Hobby/profession of working with computers. </li></ul><ul><li>Breaking into computers </li></ul><ul><li>Gaining access </li></ul>
  4. 4. Types of Hacking <ul><li>Website Hacking </li></ul><ul><li>Email Hacking </li></ul><ul><li>Network Hacking </li></ul><ul><li>Password Hacking </li></ul><ul><li>Online banking Hacking </li></ul><ul><li>Computer Hacking </li></ul>
  5. 5. Website Hacking <ul><li>Main focus- Vulnerable loopholes </li></ul><ul><li>Collapses the information </li></ul><ul><li>Make changes in the information </li></ul>
  6. 6. Email Hacking <ul><li>Can Emails Be Hacked? </li></ul><ul><li>Store business data, private information </li></ul><ul><li>Serious precautions are not taken </li></ul>
  7. 7. Computer Hacking <ul><li>Steals information from pc </li></ul><ul><li>Remote desktop connection technique </li></ul><ul><li>Accessing other person’s files </li></ul>
  8. 8. Online banking Hacking <ul><li>Online banking disadvantages </li></ul><ul><li>Hackers create fake websites </li></ul><ul><li>Using proper website address </li></ul>
  9. 9. Ethical Hacking <ul><li>Computer or network expert </li></ul><ul><li>Seeking vulnerabilities </li></ul><ul><li>Victims – Official & Private websites </li></ul>
  10. 10. What do ethical hackers do? <ul><li>An ethical hacker’s evaluation of a system security seeks answers to these basic question: </li></ul><ul><ul><li>What can an intruder see on the target systems ? </li></ul></ul><ul><ul><li>What are you trying to protect ? </li></ul></ul><ul><ul><li>What can an intruder do with that information ? </li></ul></ul>
  11. 11. <ul><li>Thousands of dollars in fines </li></ul><ul><li>Imprisonment </li></ul><ul><li>Seizure of your computer </li></ul>Consequences
  12. 12. Conclusion <ul><li>Proper ethical hackers should be employed </li></ul><ul><li>Do not expose your passwords to untrusted sites </li></ul><ul><li>Practice using exact web address </li></ul><ul><li>Close your internet while not in use </li></ul>
  13. 13. Summary <ul><li>Hacking is of two types </li></ul><ul><li>There are several types of hacking </li></ul><ul><li>Ethical hacking – a legal method </li></ul><ul><li>Consequences of illegal hacking </li></ul>
  14. 14. Thank You

×