SlideShare a Scribd company logo
1 of 7
HACKERS: BY RALIQUE STANTON
WHAT IS A “HACKER”?


• A hacker is a person who uses computers to
  gain unauthorized access to data.
• hacking is any technical effort to manipulate
  the normal behavior of network connections
  and connected systems.
HOW CAN YOU PROTECT YOUR
      COMPUTER FROM HACKERS?
• FIREWALLS- a set of related programs, located at a
  network gateway server, that protects the resources
  of a private network from users from other
  networks
• ANTI-VIRUS SOFTWARE- A type of program that
  searches your hard drive for any known or potential
  viruses, and stops them before they expand
• SECURE PASSWORDS- make sure your password is a
  strong and safe password that cannot be easily
  guessed
WHAT MOTIVATES A HACKER?
      SOME HACKERS ARE MOTIVATED FOR ENTERTAINMENT
REASONS, MEANING THEY ENJOY VANDALIZING NETWORK
PROPERTY.
      OTHERS ARE MOTIVATED FOR VENGEANCE
PURPOSES,AS IN HACKING SOMEONES FACEBOOK ACCOUNT TO
EMBARRASS THEM.
      HOWEVER, MOST HACKERS DO WHAT THEY DO TO GET
SOMETHING OUT OF IT. THEY TRY TO OBTAIN PASSWORDS TO
VARIOUS SITES AND IMPORTANT DATA. ALSO THEY LOOK FOR
YOUR PERSONAL INFORMATION, SOMETIMES BEING CREDIT
CARD INFORMATION,SOCIAL SECURITY,BILLS, AND MORE.
POTENTIAL OUTCOMES OF HACKING:
       CREDIT CARD THEFT
THERE ARE MANY OUTCOMES THAT MY OCCUR
AFTER BEING HACKED, ONE BEING CREDIT
CARD THEFT. HACKERS MAY GAIN ACCESS INTO
YOUR PERSONAL FILES AND STEAL YOUR
CREDIT CARD INFORMATION, ALLOWING THEM
TO USE YOU YOUR CREDIT CARD, AND ACCESS
INFORMATION SUCH AS PHONE NUMBERS AND
ADDRESSES.
POTENTIAL OUTCOMES OF HACKING:
 CONTROL OVER YOUR NETWORK
WHEN A HACKER GAINS ACCESS TO YOUR
NETWORK THEY MAY ALSO ACCESS ANYTHING
THAT YOUR NETWORK CONTROLS. FOR
EXAMPLE, IF YOU HAVE CAMERAS SET UP VIA A
NETWORK, ANYONE WHO HACKS YOUR
SYSTEM MAY ACCESS ANY FOOTAGE AND TURN
THEM ON/OFF.
REFERENCES
•   WWW.BLOGSPOT.COM
•   WWW.COMPNETWORKING.ABOUT.COM
•   WWW.DICTIONARY.COM
•   WWW.NEWDESIGNBLOG.COM
•   WWW.THEMANAGEMENTEXPERTS.COM
•   WWW.LISTVERSE.COM
•   WWW.WIKIPEDIA.ORG
•   WWW.AUSTINCHRONICLE.COM

More Related Content

What's hot

Internet security
Internet securityInternet security
Internet securityat1211
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniquesJhumarieAcdan
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeSMSumon8
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Gopal Rathod
 

What's hot (18)

Hacking
HackingHacking
Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security
Internet securityInternet security
Internet security
 
Spyware
SpywareSpyware
Spyware
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 

Viewers also liked

Cottage Inn NMDL FINAL
Cottage Inn NMDL FINALCottage Inn NMDL FINAL
Cottage Inn NMDL FINALphill531
 
Virtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroomVirtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroomgalaico1
 
Komposisi kategori i
Komposisi kategori iKomposisi kategori i
Komposisi kategori iNia Indah
 
震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座yaeyamahazardmap
 
Airwaybill
AirwaybillAirwaybill
Airwaybillhiepbinh
 
03.1 measuring national_income
03.1 measuring national_income03.1 measuring national_income
03.1 measuring national_incomeanshulghandwal
 
Cottage Inn NMDL Final
Cottage Inn NMDL FinalCottage Inn NMDL Final
Cottage Inn NMDL Finalphill531
 
Constitutional Convention
Constitutional ConventionConstitutional Convention
Constitutional Conventionmissmouse16a
 
Нийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээлНийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээлamra_od
 
Pentingnya kesehatan gigi skill lab
Pentingnya kesehatan gigi  skill labPentingnya kesehatan gigi  skill lab
Pentingnya kesehatan gigi skill labNia Indah
 
Macam kel. endokrin
Macam kel. endokrinMacam kel. endokrin
Macam kel. endokrinNia Indah
 
Makalah bahasa indonesia
Makalah bahasa indonesiaMakalah bahasa indonesia
Makalah bahasa indonesiaNia Indah
 
픽사템플릿 거의마지막
픽사템플릿 거의마지막픽사템플릿 거의마지막
픽사템플릿 거의마지막Eunchan Bae
 
Value Stream Mapping Lightning Talk
Value Stream Mapping Lightning TalkValue Stream Mapping Lightning Talk
Value Stream Mapping Lightning TalkKen Mugrage
 

Viewers also liked (18)

Cottage Inn NMDL FINAL
Cottage Inn NMDL FINALCottage Inn NMDL FINAL
Cottage Inn NMDL FINAL
 
Virtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroomVirtual andalusian activities for esl classroom
Virtual andalusian activities for esl classroom
 
Komposisi kategori i
Komposisi kategori iKomposisi kategori i
Komposisi kategori i
 
震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座震災を乗り越えて 石垣市民講座
震災を乗り越えて 石垣市民講座
 
Hackers
HackersHackers
Hackers
 
Airwaybill
AirwaybillAirwaybill
Airwaybill
 
Final presentation
Final presentationFinal presentation
Final presentation
 
03.1 measuring national_income
03.1 measuring national_income03.1 measuring national_income
03.1 measuring national_income
 
Cottage Inn NMDL Final
Cottage Inn NMDL FinalCottage Inn NMDL Final
Cottage Inn NMDL Final
 
Tugas mkdu
Tugas mkduTugas mkdu
Tugas mkdu
 
Natural disasters
Natural disastersNatural disasters
Natural disasters
 
Constitutional Convention
Constitutional ConventionConstitutional Convention
Constitutional Convention
 
Нийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээлНийгэм-Хөдөлмөрийн зах зээл
Нийгэм-Хөдөлмөрийн зах зээл
 
Pentingnya kesehatan gigi skill lab
Pentingnya kesehatan gigi  skill labPentingnya kesehatan gigi  skill lab
Pentingnya kesehatan gigi skill lab
 
Macam kel. endokrin
Macam kel. endokrinMacam kel. endokrin
Macam kel. endokrin
 
Makalah bahasa indonesia
Makalah bahasa indonesiaMakalah bahasa indonesia
Makalah bahasa indonesia
 
픽사템플릿 거의마지막
픽사템플릿 거의마지막픽사템플릿 거의마지막
픽사템플릿 거의마지막
 
Value Stream Mapping Lightning Talk
Value Stream Mapping Lightning TalkValue Stream Mapping Lightning Talk
Value Stream Mapping Lightning Talk
 

Similar to Hackers

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. Info-Tech
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 

Similar to Hackers (20)

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Social engineering
Social engineering Social engineering
Social engineering
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Hackers

  • 2. WHAT IS A “HACKER”? • A hacker is a person who uses computers to gain unauthorized access to data. • hacking is any technical effort to manipulate the normal behavior of network connections and connected systems.
  • 3. HOW CAN YOU PROTECT YOUR COMPUTER FROM HACKERS? • FIREWALLS- a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks • ANTI-VIRUS SOFTWARE- A type of program that searches your hard drive for any known or potential viruses, and stops them before they expand • SECURE PASSWORDS- make sure your password is a strong and safe password that cannot be easily guessed
  • 4. WHAT MOTIVATES A HACKER? SOME HACKERS ARE MOTIVATED FOR ENTERTAINMENT REASONS, MEANING THEY ENJOY VANDALIZING NETWORK PROPERTY. OTHERS ARE MOTIVATED FOR VENGEANCE PURPOSES,AS IN HACKING SOMEONES FACEBOOK ACCOUNT TO EMBARRASS THEM. HOWEVER, MOST HACKERS DO WHAT THEY DO TO GET SOMETHING OUT OF IT. THEY TRY TO OBTAIN PASSWORDS TO VARIOUS SITES AND IMPORTANT DATA. ALSO THEY LOOK FOR YOUR PERSONAL INFORMATION, SOMETIMES BEING CREDIT CARD INFORMATION,SOCIAL SECURITY,BILLS, AND MORE.
  • 5. POTENTIAL OUTCOMES OF HACKING: CREDIT CARD THEFT THERE ARE MANY OUTCOMES THAT MY OCCUR AFTER BEING HACKED, ONE BEING CREDIT CARD THEFT. HACKERS MAY GAIN ACCESS INTO YOUR PERSONAL FILES AND STEAL YOUR CREDIT CARD INFORMATION, ALLOWING THEM TO USE YOU YOUR CREDIT CARD, AND ACCESS INFORMATION SUCH AS PHONE NUMBERS AND ADDRESSES.
  • 6. POTENTIAL OUTCOMES OF HACKING: CONTROL OVER YOUR NETWORK WHEN A HACKER GAINS ACCESS TO YOUR NETWORK THEY MAY ALSO ACCESS ANYTHING THAT YOUR NETWORK CONTROLS. FOR EXAMPLE, IF YOU HAVE CAMERAS SET UP VIA A NETWORK, ANYONE WHO HACKS YOUR SYSTEM MAY ACCESS ANY FOOTAGE AND TURN THEM ON/OFF.
  • 7. REFERENCES • WWW.BLOGSPOT.COM • WWW.COMPNETWORKING.ABOUT.COM • WWW.DICTIONARY.COM • WWW.NEWDESIGNBLOG.COM • WWW.THEMANAGEMENTEXPERTS.COM • WWW.LISTVERSE.COM • WWW.WIKIPEDIA.ORG • WWW.AUSTINCHRONICLE.COM