Ict Hacking

15,582 views

Published on

Published in: Technology
3 Comments
1 Like
Statistics
Notes
No Downloads
Views
Total views
15,582
On SlideShare
0
From Embeds
0
Number of Embeds
54
Actions
Shares
0
Downloads
343
Comments
3
Likes
1
Embeds 0
No embeds

No notes for slide

Ict Hacking

  1. 1. TOPIC : HACKING <ul><li>PRESENTER : </li></ul><ul><li>FATIMAH ZUBAIDAH BINTI MOHD </li></ul>
  2. 2. CONTENT <ul><li>DEFINITION </li></ul><ul><li>HISTORY OF HACKERS </li></ul><ul><li>SECURITY MEASURE </li></ul><ul><li>CONCLUSION </li></ul>
  3. 3. DEFINITION <ul><li>Hacking is a source of threat to security in computer. </li></ul><ul><li>It is define as unauthorized access to the computer system by a hacker. </li></ul><ul><li>Hackers are persons who learn about the computer system in details. They write program referred to as hacks. </li></ul><ul><li>Hackers may use a modem or cable to hack the targeted computers. </li></ul>
  4. 4. THE HISTORY OF HACKERS <ul><li>Gary McKinnon: This 41-year-old Scotsman, also known as Solo, is the person behind of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection. </li></ul><ul><li>Vladimir Levin: This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free. </li></ul>
  5. 5. <ul><li>Timothy Lloyd: In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that same year. </li></ul><ul><li>David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe - David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail. </li></ul><ul><li>MafiaBoy: In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad deed to his classmates at school. </li></ul>
  6. 6. SECURITY MEASURE <ul><li>DATA BACKUP </li></ul><ul><ul><li>Data backup is a program of file duplication. Backup of data applications are necessary so that they can be recovered in case of an emergency. </li></ul></ul><ul><li>ANTI-VIRUS </li></ul><ul><ul><li>An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming email files. </li></ul></ul>
  7. 7. <ul><li>ANTI-SPYWARE </li></ul><ul><ul><li>Spyware is a program place on a computer without the user’s knowlegde. It secretly collects infofmation about the user. Communicates information to the outside source. </li></ul></ul><ul><li>FIREWALL </li></ul><ul><ul><li>Firewall is a piece of hardware or software which function in a networked environment to prevent some communication forbidden by the security policy. </li></ul></ul>
  8. 8. CONCLUSION <ul><li>Hacking is a criminal. </li></ul><ul><li>Computers need good security measure system to prevent from hacking. </li></ul><ul><li>Example of security measure system is Data Backup, Anti-Virus, Anti-Spyware and Firewall. Disaster Recovary system. </li></ul>
  9. 9. REFERENCE <ul><li>INTERNET </li></ul><ul><ul><li>www.wikipedia.com </li></ul></ul><ul><ul><li>www.trend - micro.com </li></ul></ul><ul><li>BOOK </li></ul><ul><ul><li>Introduction to information and communication technology ( </li></ul></ul><ul><ul><ul><li>page 43, 45, 46 & 47) ( </li></ul></ul></ul><ul><ul><ul><li>SMK Pekan 2006. </li></ul></ul></ul>
  10. 10. <ul><li>- THAT’S ALL- </li></ul><ul><li>-THANK YOU- </li></ul>

×