SlideShare a Scribd company logo
1 of 10
Hacking 
Rodrigo Jiménez 1 SMX A
1. Hacking refers to 
the activities which 
are done to intrude 
someone else’s 
personal information 
so as to use it for 
malicious, unwanted 
purposes. 
WHAT IS HACKING ? 
2. Hacking is a term which refers to the activities aimed 
at exploiting security flaws to obtain personal information 
for gaining access to secured networks.
A typical attacker works in the following manner: 
Identify the target system. 
Gathering Information on the target system. 
Finding a possible loophole in the target system. 
Exploiting this loophole using exploit code. 
Removing all traces from the log files and escaping without a trace.
When someone hacks a computer or 
network system, it's typically for one of 
the following reasons: 
1. Credit Card Information(for money) 
In recent years it has become increasingly possible for 
hackers to steal credit card information. With online 
shopping and online banking becoming more prevalent, the 
opportunity for a skilled hacker to acquire credit card 
information continues to grow.
2. Identity Theft 
Hackers can potentially steal 
identity by simply hacking into a 
computer. With a stolen identity, 
a hacker can do almost everything. 
3. Business Information 
In the modern world it is not at all uncommon for incredibly 
important business information to be stored on computers. 
Hackers can steal financial information, account numbers, 
and even client information. 
4. Egotism 
Some hackers hack computers solely to prove that they can. 
These individuals may do anything from small-scale hacking 
all the way up to full-on identity.
1. FINANCIAL LOSSES 
In 2011, Sony lost $170 million due to a 
hack of their PlayStation system. Also 
in 2011, CitiGroup lost $2.7 million and 
AT&T lost $2 million as a result of 
hackers. 
2. LOSS OF INFORMATION 
Hacking often results in a loss of data 
due to files being deleted or changed. 
leak of top secret information could 
cause real-world security issues. 
Servers at the Pentagon, FBI, Interpol 
and NASA have all been compromised at 
various points. various points in the past ten 
years.
1. $171 million – Sony 
2. $2.7 million – Citigroup 
3. $2 million – Stratfor 
4. $2 million – AT&T
1.USA 
2.China 
3.Turkey 
4.Russia 
5.Taiwan 
6.Brazil 
7.Romania 
8.India 
9.Italy 
10.Hungary
Kevin David Mitnick (born August 6, 
1963) is an American computer 
security consultant, author and hacker. In 
1999, he was convicted of various 
computer and communications-related 
crimes. At the time of his arrest, he was the 
most-wanted computer criminal in the 
United States.
Hack

More Related Content

What's hot

Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo
 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTVivekanandan M
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Digital Security
Digital SecurityDigital Security
Digital SecurityCASTAC01
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 

What's hot (19)

Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
 
Phishing
PhishingPhishing
Phishing
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 

Viewers also liked

Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.Luxury in your Life
 
Realidad universitarya
Realidad universitaryaRealidad universitarya
Realidad universitaryarkemer_8
 
Wallace phillip 10_2015_resume
Wallace phillip 10_2015_resumeWallace phillip 10_2015_resume
Wallace phillip 10_2015_resumePhillip Wallace
 
Trabajo de metodos
Trabajo de metodosTrabajo de metodos
Trabajo de metodosrkemer_8
 
Presentacion programas
Presentacion programasPresentacion programas
Presentacion programasDiuxy Martinez
 
El parlamento de los animales
El parlamento de los animalesEl parlamento de los animales
El parlamento de los animalesMiriamSirvent
 
Database operation di C++
Database operation di C++Database operation di C++
Database operation di C++FgroupIndonesia
 
Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)Bryan Charro
 
Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.javierot99
 
HackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation SlidesHackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation SlidesElisabeth Fosslien
 
Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015Mike Helmus
 
ley de la propiedad intelectual
ley de la propiedad intelectualley de la propiedad intelectual
ley de la propiedad intelectualRubén García
 
La estadÍstica en el proceso de la investigación científica
La estadÍstica en el proceso de la  investigación científicaLa estadÍstica en el proceso de la  investigación científica
La estadÍstica en el proceso de la investigación científicaMarinaArosemena
 

Viewers also liked (18)

Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.
 
Realidad universitarya
Realidad universitaryaRealidad universitarya
Realidad universitarya
 
Manual de usuario
Manual de usuarioManual de usuario
Manual de usuario
 
Wallace phillip 10_2015_resume
Wallace phillip 10_2015_resumeWallace phillip 10_2015_resume
Wallace phillip 10_2015_resume
 
practica 9
practica 9practica 9
practica 9
 
Trabajo de metodos
Trabajo de metodosTrabajo de metodos
Trabajo de metodos
 
Presentacion programas
Presentacion programasPresentacion programas
Presentacion programas
 
El parlamento de los animales
El parlamento de los animalesEl parlamento de los animales
El parlamento de los animales
 
Database operation di C++
Database operation di C++Database operation di C++
Database operation di C++
 
Mdia3002 image gallery
Mdia3002 image galleryMdia3002 image gallery
Mdia3002 image gallery
 
Nico. titanic
Nico. titanicNico. titanic
Nico. titanic
 
Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)
 
practica 6
practica 6practica 6
practica 6
 
Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.
 
HackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation SlidesHackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation Slides
 
Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015
 
ley de la propiedad intelectual
ley de la propiedad intelectualley de la propiedad intelectual
ley de la propiedad intelectual
 
La estadÍstica en el proceso de la investigación científica
La estadÍstica en el proceso de la  investigación científicaLa estadÍstica en el proceso de la  investigación científica
La estadÍstica en el proceso de la investigación científica
 

Similar to Hack

Network security
Network securityNetwork security
Network securitymena kaheel
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptxsagarpanthee
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Hacking
HackingHacking
HackingVirus
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 

Similar to Hack (20)

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Network security
Network securityNetwork security
Network security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Hack

  • 2. 1. Hacking refers to the activities which are done to intrude someone else’s personal information so as to use it for malicious, unwanted purposes. WHAT IS HACKING ? 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks.
  • 3. A typical attacker works in the following manner: Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
  • 4. When someone hacks a computer or network system, it's typically for one of the following reasons: 1. Credit Card Information(for money) In recent years it has become increasingly possible for hackers to steal credit card information. With online shopping and online banking becoming more prevalent, the opportunity for a skilled hacker to acquire credit card information continues to grow.
  • 5. 2. Identity Theft Hackers can potentially steal identity by simply hacking into a computer. With a stolen identity, a hacker can do almost everything. 3. Business Information In the modern world it is not at all uncommon for incredibly important business information to be stored on computers. Hackers can steal financial information, account numbers, and even client information. 4. Egotism Some hackers hack computers solely to prove that they can. These individuals may do anything from small-scale hacking all the way up to full-on identity.
  • 6. 1. FINANCIAL LOSSES In 2011, Sony lost $170 million due to a hack of their PlayStation system. Also in 2011, CitiGroup lost $2.7 million and AT&T lost $2 million as a result of hackers. 2. LOSS OF INFORMATION Hacking often results in a loss of data due to files being deleted or changed. leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points. various points in the past ten years.
  • 7. 1. $171 million – Sony 2. $2.7 million – Citigroup 3. $2 million – Stratfor 4. $2 million – AT&T
  • 8. 1.USA 2.China 3.Turkey 4.Russia 5.Taiwan 6.Brazil 7.Romania 8.India 9.Italy 10.Hungary
  • 9. Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author and hacker. In 1999, he was convicted of various computer and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.