2. What is hacking/ hacker
• A hacker is a person skilled in information technology
who uses their technical knowledge to achieve a goal
or overcome an obstacle, within a computerized
system by non-standard means.
• Hacking is the act of compromising digital devices and
networks through unauthorized access to an account
or computer system.
3. History of Hacking:
First computer hack was in late 1960s when bell labs successfully
hacked and modified a UNIX operating system
Three phases of hacking:
1)Phase 1: the 1960’s and 1970’s
2)Phase 2: period from 1970’s to 1990’s
3)Phase 3: Beginning in the mid 1990’s with growth of the web.
4.
5.
6. Who were the first hackers?
• John draper
• Kevin Poulsen
• Robert Tappen Morris
7.
8. QUIZ:
Suppose you want to learn some hacking skills for
good purpose and you start learning by
demonstrating hacking techniques which is
developed by others. Who are you ?
A. Green Hat Hacker
B. Black Hat Hacker
C. White Hat Hacker
D. Red Hat Hacker
9. QUIZ:
Who are ethical hackers?
A. Green Hat Hacker
B. Black Hat Hacker
C. White Hat Hacker
D. Red Hat Hacker
18. Whenever you visit a banking or e-commerce website, look for a
“locked padlock” icon somewhere in the window of the browser, and
ensure that the site’s URL begins with “https”. Presence of these two
elements signify that you are on a secured website.
26. • In phishing – via e-mail.
• In vishing – by means of a phone call.
• In smishing – via SMS.
• In pharming – secret redirection of users to third-party websites?
27.
28. How to protect yourself from Phishing, Vishing,
Smishing, Pharming?
29. •Every time pay attention to the sender and subject of the message. If
they look suspicious, just delete these emails or SMS;
•Do not click the suggested links in emails and messages from an
unknown sender;
•Never reply to messages requesting personal information;
•Watch for mistakes in the text, if you find them, most likely the letter is a
hoax;
•Files attached to an unknown message that have .exe, .msi, .bat, .pif,
.com, .vbs, .reg, and .zip extensions can install malicious software, there
is no point to open them
31. Spear phishing involves targeting a specific
organization to try to steal their login credentials.
EXAMPLE :
Threat Group-4127 (Fancy Bear) targeted Hillary
Clinton's campaign with spear phishing attacks on
over 1,800 Google accounts, using the accounts-
google.com domain to threaten targeted users.
33. Whaling : phishing techniques to target
senior executives(CEOs) and other high-
profile individuals with customized
content
34.
35.
36.
37. Deceptive Phishing: refers to any attack where
the attacker impersonates a legitimate company in
an attempt to steal your personal information or
your login credentials.
43. Angler Phishing:
• Angler phishing is a type of phishing attack that targets social media
users. A hacker creates a fake social media account and pretends to
be a customer service employee working for a company. Next, they
contact customers of that company who have made complaints on
social media.
44. QUIZ:
You get an email from a bank claiming that your
account has been frozen unless you click on the
link provided and enter your account information.
Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
45. QUIZ:
You get an email that’s supposedly from your
CEO saying they need you to wire transfer the
money, Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
46. QUIZ:
Between 2013 and 2015, Evaldas Rimasauskas impersonated a
Taiwanese hardware supplier, Quanta computer, whose
services were used by two tech giants, Google and Facebook.
He sent out fake invoices worth $122 million ($99 million and
$23 million to Google and Facebook, respectively) to these
companies for almost three years until he was arrested and
prisoned for 30 years. Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
54. Software Piracy
•The use and or distribution of copyrighted
computer software in violation of the
copyright laws or applicable license
restrictions.
55. •Video on Malware- Differences between Virus,
Worm, Trojan Horse, Ransomware and Spyware.
57. Quiz time:
1)The malware which needs host program?
• A)Worm- standalone
• B)Virus- needs host program
58. Quiz time:
2)The malware which looks legitimate but acts as a backdoor function
for various attacks?
• A)Worm
• B)Virus
• C)Trojan Horse
59. Quiz time:
2)The malware which acts as a backdoor for various attacks?
• A)Worm
• B)Virus
• C) Trojan Horse
60. Quiz time:
3)The malware which makes the victim blocked from access unless a
ransom is paid off?
A)Worm
B)Ransomware
C) Spyware
61. Quiz time:
3)The malware which makes the victim blocked from access unless a
ransom is paid off?
A)Worm
B)Ransomware
C) Spyware
62. Quiz time:
4) A type of computer program that is secretly installed on a person's
computer or mobile device in order to obtain the owner's private
information, such as lists of websites visited, passwords, and credit
card numbers.
A)Spyware
C) Ransomware
63. Quiz time:
4) A type of computer program that is secretly installed on a person's
computer or mobile device in order to obtain the owner's private
information, such as lists of websites visited, passwords, and credit
card numbers.
A)Spyware
C) Ransomware
64. Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
65. Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
66. Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus