SlideShare a Scribd company logo
1 of 7
HACKERS: BY RALIQUE STANTON
WHAT IS A “HACKER”?


• A hacker is a person who uses computers to
  gain unauthorized access to data.
• hacking is any technical effort to manipulate
  the normal behavior of network connections
  and connected systems.
HOW CAN YOU PROTECT YOUR
      COMPUTER FROM HACKERS?
• FIREWALLS- a set of related programs, located at a
  network gateway server, that protects the resources
  of a private network from users from other
  networks
• ANTI-VIRUS SOFTWARE- A type of program that
  searches your hard drive for any known or potential
  viruses, and stops them before they expand
• SECURE PASSWORDS- make sure your password is a
  strong and safe password that cannot be easily
  guessed
WHAT MOTIVATES A HACKER?
      SOME HACKERS ARE MOTIVATED FOR ENTERTAINMENT
REASONS, MEANING THEY ENJOY VANDALIZING NETWORK
PROPERTY.
      OTHERS ARE MOTIVATED FOR VENGEANCE
PURPOSES,AS IN HACKING SOMEONES FACEBOOK ACCOUNT TO
EMBARRASS THEM.
      HOWEVER, MOST HACKERS DO WHAT THEY DO TO GET
SOMETHING OUT OF IT. THEY TRY TO OBTAIN PASSWORDS TO
VARIOUS SITES AND IMPORTANT DATA. ALSO THEY LOOK FOR
YOUR PERSONAL INFORMATION, SOMETIMES BEING CREDIT
CARD INFORMATION,SOCIAL SECURITY,BILLS, AND MORE.
POTENTIAL OUTCOMES OF HACKING:
       CREDIT CARD THEFT
THERE ARE MANY OUTCOMES THAT MY OCCUR
AFTER BEING HACKED, ONE BEING CREDIT
CARD THEFT. HACKERS MAY GAIN ACCESS INTO
YOUR PERSONAL FILES AND STEAL YOUR
CREDIT CARD INFORMATION, ALLOWING THEM
TO USE YOU YOUR CREDIT CARD, AND ACCESS
INFORMATION SUCH AS PHONE NUMBERS AND
ADDRESSES.
POTENTIAL OUTCOMES OF HACKING:
 CONTROL OVER YOUR NETWORK
WHEN A HACKER GAINS ACCESS TO YOUR
NETWORK THEY MAY ALSO ACCESS ANYTHING
THAT YOUR NETWORK CONTROLS. FOR
EXAMPLE, IF YOU HAVE CAMERAS SET UP VIA A
NETWORK, ANYONE WHO HACKS YOUR
SYSTEM MAY ACCESS ANY FOOTAGE AND TURN
THEM ON/OFF.
REFERENCES
•   WWW.BLOGSPOT.COM
•   WWW.COMPNETWORKING.ABOUT.COM
•   WWW.DICTIONARY.COM
•   WWW.NEWDESIGNBLOG.COM
•   WWW.THEMANAGEMENTEXPERTS.COM
•   WWW.LISTVERSE.COM
•   WWW.WIKIPEDIA.ORG
•   WWW.AUSTINCHRONICLE.COM

More Related Content

What's hot

Internet security
Internet securityInternet security
Internet securityat1211
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniquesJhumarieAcdan
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeSMSumon8
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Gopal Rathod
 

What's hot (18)

Hacking
HackingHacking
Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security
Internet securityInternet security
Internet security
 
Spyware
SpywareSpyware
Spyware
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 

Viewers also liked

Cottage Inn NMDL FINAL
Cottage Inn NMDL FINALCottage Inn NMDL FINAL
Cottage Inn NMDL FINALphill531
 
Virtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroomVirtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroomgalaico1
 
震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座yaeyamahazardmap
 
03.1 measuring national_income
03.1 measuring national_income03.1 measuring national_income
03.1 measuring national_incomeanshulghandwal
 
Komposisi kategori i
Komposisi kategori iKomposisi kategori i
Komposisi kategori iNia Indah
 
Airwaybill
AirwaybillAirwaybill
Airwaybillhiepbinh
 
Cottage Inn NMDL Final
Cottage Inn NMDL FinalCottage Inn NMDL Final
Cottage Inn NMDL Finalphill531
 
Constitutional Convention
Constitutional ConventionConstitutional Convention
Constitutional Conventionmissmouse16a
 
Нийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээлНийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээлamra_od
 
Pentingnya kesehatan gigi skill lab
Pentingnya kesehatan gigi  skill labPentingnya kesehatan gigi  skill lab
Pentingnya kesehatan gigi skill labNia Indah
 
Macam kel. endokrin
Macam kel. endokrinMacam kel. endokrin
Macam kel. endokrinNia Indah
 
Makalah bahasa indonesia
Makalah bahasa indonesiaMakalah bahasa indonesia
Makalah bahasa indonesiaNia Indah
 
픽사템플릿 거의마지막
픽사템플릿 거의마지막픽사템플릿 거의마지막
픽사템플릿 거의마지막Eunchan Bae
 
Value Stream Mapping Lightning Talk
Value Stream Mapping Lightning TalkValue Stream Mapping Lightning Talk
Value Stream Mapping Lightning TalkKen Mugrage
 

Viewers also liked (18)

Cottage Inn NMDL FINAL
Cottage Inn NMDL FINALCottage Inn NMDL FINAL
Cottage Inn NMDL FINAL
 
Virtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroomVirtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroom
 
震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座
 
03.1 measuring national_income
03.1 measuring national_income03.1 measuring national_income
03.1 measuring national_income
 
Komposisi kategori i
Komposisi kategori iKomposisi kategori i
Komposisi kategori i
 
Hackers
HackersHackers
Hackers
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Airwaybill
AirwaybillAirwaybill
Airwaybill
 
Cottage Inn NMDL Final
Cottage Inn NMDL FinalCottage Inn NMDL Final
Cottage Inn NMDL Final
 
Tugas mkdu
Tugas mkduTugas mkdu
Tugas mkdu
 
Natural disasters
Natural disastersNatural disasters
Natural disasters
 
Constitutional Convention
Constitutional ConventionConstitutional Convention
Constitutional Convention
 
Нийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээлНийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээл
 
Pentingnya kesehatan gigi skill lab
Pentingnya kesehatan gigi  skill labPentingnya kesehatan gigi  skill lab
Pentingnya kesehatan gigi skill lab
 
Macam kel. endokrin
Macam kel. endokrinMacam kel. endokrin
Macam kel. endokrin
 
Makalah bahasa indonesia
Makalah bahasa indonesiaMakalah bahasa indonesia
Makalah bahasa indonesia
 
픽사템플릿 거의마지막
픽사템플릿 거의마지막픽사템플릿 거의마지막
픽사템플릿 거의마지막
 
Value Stream Mapping Lightning Talk
Value Stream Mapping Lightning TalkValue Stream Mapping Lightning Talk
Value Stream Mapping Lightning Talk
 

Similar to Hackers

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. Info-Tech
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 

Similar to Hackers (20)

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Social engineering
Social engineering Social engineering
Social engineering
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Hackers

  • 2. WHAT IS A “HACKER”? • A hacker is a person who uses computers to gain unauthorized access to data. • hacking is any technical effort to manipulate the normal behavior of network connections and connected systems.
  • 3. HOW CAN YOU PROTECT YOUR COMPUTER FROM HACKERS? • FIREWALLS- a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks • ANTI-VIRUS SOFTWARE- A type of program that searches your hard drive for any known or potential viruses, and stops them before they expand • SECURE PASSWORDS- make sure your password is a strong and safe password that cannot be easily guessed
  • 4. WHAT MOTIVATES A HACKER? SOME HACKERS ARE MOTIVATED FOR ENTERTAINMENT REASONS, MEANING THEY ENJOY VANDALIZING NETWORK PROPERTY. OTHERS ARE MOTIVATED FOR VENGEANCE PURPOSES,AS IN HACKING SOMEONES FACEBOOK ACCOUNT TO EMBARRASS THEM. HOWEVER, MOST HACKERS DO WHAT THEY DO TO GET SOMETHING OUT OF IT. THEY TRY TO OBTAIN PASSWORDS TO VARIOUS SITES AND IMPORTANT DATA. ALSO THEY LOOK FOR YOUR PERSONAL INFORMATION, SOMETIMES BEING CREDIT CARD INFORMATION,SOCIAL SECURITY,BILLS, AND MORE.
  • 5. POTENTIAL OUTCOMES OF HACKING: CREDIT CARD THEFT THERE ARE MANY OUTCOMES THAT MY OCCUR AFTER BEING HACKED, ONE BEING CREDIT CARD THEFT. HACKERS MAY GAIN ACCESS INTO YOUR PERSONAL FILES AND STEAL YOUR CREDIT CARD INFORMATION, ALLOWING THEM TO USE YOU YOUR CREDIT CARD, AND ACCESS INFORMATION SUCH AS PHONE NUMBERS AND ADDRESSES.
  • 6. POTENTIAL OUTCOMES OF HACKING: CONTROL OVER YOUR NETWORK WHEN A HACKER GAINS ACCESS TO YOUR NETWORK THEY MAY ALSO ACCESS ANYTHING THAT YOUR NETWORK CONTROLS. FOR EXAMPLE, IF YOU HAVE CAMERAS SET UP VIA A NETWORK, ANYONE WHO HACKS YOUR SYSTEM MAY ACCESS ANY FOOTAGE AND TURN THEM ON/OFF.
  • 7. REFERENCES • WWW.BLOGSPOT.COM • WWW.COMPNETWORKING.ABOUT.COM • WWW.DICTIONARY.COM • WWW.NEWDESIGNBLOG.COM • WWW.THEMANAGEMENTEXPERTS.COM • WWW.LISTVERSE.COM • WWW.WIKIPEDIA.ORG • WWW.AUSTINCHRONICLE.COM