Brief introduction on Hacking and its effects.In this technological era it is important to know about whether your data is safe or not on any social media as well as any governmental sites.
2. Introduction
Types of Hacking
1) Spoofing
2) Phishing
3) Computer viruses & Trojan
Horses
4) Credit card froud
5) Internet farming
• Guidelines for adults,
children and teenagers.
• How to protect yourself
3. Hacking means an illegal interference into a computer
network or our personal email id.
The intention can range from financial gains such as
stealing credit card information, transferring money from
various bank accounts to their own account followed by
withdrawal of money.
It could also be for revenge or a desire to access illegal
information.
Thus if anyone secures access to a computer without the
consent of the owner shall be legally responsible to pay
compensation of 1 crore rupees under Information
Technology Act ,2000.
4. Spoofing refers to an online process which involves sending an
e-mail using a fake name or e-mail id so as to make it appear that
the e-mail has come from someone else other than the real person
who has send.
Spoofing is done simply faking an identity, such as username.
Spoofing can take place in the net in many ways. One common
way is by e-mail. E-mail spoofing involves sending messages
using a fake e-mail id or faking the e-mail address of other user.
Second way of spoofing takes place in the Internet through IP
spoofing. This involves masking the IP address of a computer
system. By hiding(or) faking a system’s IP address, it is difficult
for other systems to find out where the system is transmitting
data from.
5.
6. By means of e-mail messages which completely resembles
the original mail messages of consumers, hackers can ask
for confirmation of certain information, like account
information or passwords etc.
Here consumer might not know the fact that the e-mail
messages are deceiving and would fail to make out the
originality of the messages, this results in huge financial
loss when the hackers use that information for deceitful acts
like withdrawing money from consumers account without
their knowledge
Phone Phishing – It is done by use of in-voice messages by
the hackers where the consumers are asked to tell their
account identification, and passwords to file a complaint for
any problems concerning their bank accounts etc.
7.
8. Viruses are used by Hackers to infect the user’s PC and destroy
the data saved in the system using “payload” in viruses which
carries damaging code.
Trojan horses, which are attached to other codes, are the main
cause of all illegal access. When a anyone downloads and
installs a Trojan horse, the hacked software kicks off a virus,
password detector, or remote-control switch that gives the
hacker a regulation of the PC.
9.
10. This kind of deceit results in Enormous loss to the victim.
This is done by means of publishing bogus digital
signatures.
Many people lose their credit cards on the way of delivery
to the recipient or its damaged or defective, misrepresented
etc.
Banks and other financial institutions are vulnerable to the
revolutionary groups to use their sensitive information
resulting in serious loss. There are different ways used by
hackers to gain illegal access to the systems despite using
viruses like Trojans and worms etc.
11.
12. • Here hacker aims at redirecting the website used by the
client to another fake website by hijacking the user’s
DNS server and altering his I.P address to bogus
website by manipulating the DNS server.
• This redirects user’s original website to a false
deceptive website to achieve illegal information.
13.
14. Do not give out personal information such as name,
house address or telephone number in a chat with
strangers.
Do not send your photos to any one on the Internet
Do not react to messages which are menacing.
Never arrange a meeting without informing your
parents.
keep in mind that people online may not be who they
appear to be.
15. Make sure that your passwords comprise of both letters
and numbers, and are no less than eight characters .keep
away from common words. Hackers use programs which
can try each word in the dictionary.
Don't use your own information,for your login name or
adjoining keys on the keyboard as passwords
Don't share your account information online or on the
phone
Protect your system from viruses by anti-virus software
and updating it regularly
Use diverse passwords for different websites.
Send credit card information no more than to secure sites