Hacking

3,493 views

Published on

Published in: Technology, News & Politics
1 Comment
1 Like
Statistics
Notes
  • 16% of people took a first name as a password, often their own or one of their children, according to the study published by Information Week. Another 14% relied on the easiest keyboard combination to remember such as “1234” or “12345678”. But there is a safer way.

    Check www.smartsignin.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
3,493
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
163
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. HackingHacking A technological threat
  2. 2. OverviewOverview • What is hacking • Types of hacking • Ethical hacking • Consequences • Conclusion
  3. 3. HackingHacking • Hobby/profession of working with computers. • Breaking into computers • Gaining access
  4. 4. Types of HackingTypes of Hacking • Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online banking Hacking • Computer Hacking
  5. 5. Website HackingWebsite Hacking • Main focus- Vulnerable loopholes • Collapses the information • Make changes in the information
  6. 6. Email HackingEmail Hacking • Can Emails Be Hacked? • Store business data, private information • Serious precautions are not taken
  7. 7. Computer HackingComputer Hacking • Steals information from pc • Remote desktop connection technique • Accessing other person’s files
  8. 8. Online banking HackingOnline banking Hacking • Online banking disadvantages • Hackers create fake websites • Using proper website address
  9. 9. Ethical HackingEthical Hacking • Computer or network expert • Seeking vulnerabilities • Victims – Official & Private websites
  10. 10. What do ethical hackers do?What do ethical hackers do? An ethical hacker’s evaluation of a system security seeks answers to these basic question:  What can an intruder see on the target systems?  What are you trying to protect ?  What can an intruder do with that information ?
  11. 11. • Thousands of dollars in fines • Imprisonment • Seizure of your computer ConsequencesConsequences
  12. 12. ConclusionConclusion • Proper ethical hackers should be employed • Do not expose your passwords to untrusted sites • Practice using exact web address • Close your internet while not in use
  13. 13. SummarySummary • Hacking is of two types • There are several types of hacking • Ethical hacking – a legal method • Consequences of illegal hacking
  14. 14. Thank YouThank You

×