SlideShare a Scribd company logo
𝓒𝓸𝓶𝓹𝓾𝓽𝓮𝓻 𝓔𝓽𝓱𝓲𝓬𝓼 :
HACKI
NG
AAKANKSHA SAKHARE 9J 24
HACKING
◼ hacking is the process of gaining unauthorized access into a
computer system, or group of computer systems. hacking is
identifying and exploiting weaknesses in computer systems and/or
computer networks.
◼ practice of modifying or altering computer software and hardware
to accomplish a goal that is considered to be outside of the
creator’s original objective.
◼ unlike the majority of computer crimes which are regarded as
clear cut in terms of legality issues, computer hacking is somewhat
ambiguous.
◼ those individuals who engage in computer hacking activities are
typically referred to as “hackers”.
HACKER
◼ a malicious meddler who attempts to discover and
subsequently tamper with sensitive information through
poking around computer-based technologies. the majority of
hackers possess an advanced understanding of computer
technology.
◼ will possess an expert level in a particular computer program
and have advanced abilities in regards to computer
programming.
◼ there are also hackers who use same skills for good. such
hackers are called white hat hackers.
2.Releasing Viruses To Corrupt Files
EXAMPLES FOR HACKING
REASONS OF HACKING
4. thrill and excitement
◼ people think that it is exciting to be a part of
world of computer crimes.
◼ december 27 1994:
◼ after experiencing an ip spoofing attack
by kevin mitnick, computer security
expert started to receive prank calls that
popularized the phrase "my kung fu is
stronger than yours".
5.romanticizing of hacking
6. money
in 2018 hackers stole half a billion personal records
◼ this was a 126% jump from 2017.
◼ since 2013 there are approximately 3,809,448 records
stolen from breaches.
◼ reports cybersecurity ventures.
the average cost of a data breach in 2020 will exceed $150
million
◼ that cybercrime will cost businesses over $2 trillion total in
2019.
◼ suggests juniper research
CONCLUSION
◼ ginni rometty, ibm’s chairman, president and ceo,
said:
◼ “cybercrime is the greatest threat to every company
in the world.” and she was right.
◼ during the next five years, cybercrime might
become the greatest threat to every person, place
and thing in the world.
AAKANKSHA 9J 24

More Related Content

Similar to Computer Ethics - Hacking

Internet Security
Internet SecurityInternet Security
Internet Security
Parv Poddar
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
HACKING
HACKINGHACKING
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
Ahmed Tememe
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
karthickB24
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 

Similar to Computer Ethics - Hacking (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
Hacking
HackingHacking
Hacking
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

More from thelilly

PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022
thelilly
 
DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022
thelilly
 
Spectrum: The Beauty of Light
Spectrum: The Beauty of LightSpectrum: The Beauty of Light
Spectrum: The Beauty of Light
thelilly
 
Indian Union's Governance System
Indian Union's Governance SystemIndian Union's Governance System
Indian Union's Governance System
thelilly
 
THE PERIODIC TABLE
THE PERIODIC TABLETHE PERIODIC TABLE
THE PERIODIC TABLE
thelilly
 
Photosynthesis Presentation Part 2
Photosynthesis Presentation Part 2Photosynthesis Presentation Part 2
Photosynthesis Presentation Part 2
thelilly
 
Photosynthesis: A Plants Kitchen
Photosynthesis: A Plants KitchenPhotosynthesis: A Plants Kitchen
Photosynthesis: A Plants Kitchen
thelilly
 

More from thelilly (7)

PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022
 
DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022
 
Spectrum: The Beauty of Light
Spectrum: The Beauty of LightSpectrum: The Beauty of Light
Spectrum: The Beauty of Light
 
Indian Union's Governance System
Indian Union's Governance SystemIndian Union's Governance System
Indian Union's Governance System
 
THE PERIODIC TABLE
THE PERIODIC TABLETHE PERIODIC TABLE
THE PERIODIC TABLE
 
Photosynthesis Presentation Part 2
Photosynthesis Presentation Part 2Photosynthesis Presentation Part 2
Photosynthesis Presentation Part 2
 
Photosynthesis: A Plants Kitchen
Photosynthesis: A Plants KitchenPhotosynthesis: A Plants Kitchen
Photosynthesis: A Plants Kitchen
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Computer Ethics - Hacking

  • 2. HACKING ◼ hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. ◼ practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. ◼ unlike the majority of computer crimes which are regarded as clear cut in terms of legality issues, computer hacking is somewhat ambiguous. ◼ those individuals who engage in computer hacking activities are typically referred to as “hackers”.
  • 3. HACKER ◼ a malicious meddler who attempts to discover and subsequently tamper with sensitive information through poking around computer-based technologies. the majority of hackers possess an advanced understanding of computer technology. ◼ will possess an expert level in a particular computer program and have advanced abilities in regards to computer programming. ◼ there are also hackers who use same skills for good. such hackers are called white hat hackers.
  • 4. 2.Releasing Viruses To Corrupt Files EXAMPLES FOR HACKING
  • 6. 4. thrill and excitement ◼ people think that it is exciting to be a part of world of computer crimes. ◼ december 27 1994: ◼ after experiencing an ip spoofing attack by kevin mitnick, computer security expert started to receive prank calls that popularized the phrase "my kung fu is stronger than yours".
  • 8. 6. money in 2018 hackers stole half a billion personal records ◼ this was a 126% jump from 2017. ◼ since 2013 there are approximately 3,809,448 records stolen from breaches. ◼ reports cybersecurity ventures. the average cost of a data breach in 2020 will exceed $150 million ◼ that cybercrime will cost businesses over $2 trillion total in 2019. ◼ suggests juniper research
  • 9. CONCLUSION ◼ ginni rometty, ibm’s chairman, president and ceo, said: ◼ “cybercrime is the greatest threat to every company in the world.” and she was right. ◼ during the next five years, cybercrime might become the greatest threat to every person, place and thing in the world.