SlideShare a Scribd company logo
Hacking 
Rodrigo Jiménez 1 SMX A
1. Hacking refers to 
the activities which 
are done to intrude 
someone else’s 
personal information 
so as to use it for 
malicious, unwanted 
purposes. 
WHAT IS HACKING ? 
2. Hacking is a term which refers to the activities aimed 
at exploiting security flaws to obtain personal information 
for gaining access to secured networks.
A typical attacker works in the following manner: 
Identify the target system. 
Gathering Information on the target system. 
Finding a possible loophole in the target system. 
Exploiting this loophole using exploit code. 
Removing all traces from the log files and escaping without a trace.
When someone hacks a computer or 
network system, it's typically for one of 
the following reasons: 
1. Credit Card Information(for money) 
In recent years it has become increasingly possible for 
hackers to steal credit card information. With online 
shopping and online banking becoming more prevalent, the 
opportunity for a skilled hacker to acquire credit card 
information continues to grow.
2. Identity Theft 
Hackers can potentially steal 
identity by simply hacking into a 
computer. With a stolen identity, 
a hacker can do almost everything. 
3. Business Information 
In the modern world it is not at all uncommon for incredibly 
important business information to be stored on computers. 
Hackers can steal financial information, account numbers, 
and even client information. 
4. Egotism 
Some hackers hack computers solely to prove that they can. 
These individuals may do anything from small-scale hacking 
all the way up to full-on identity.
1. FINANCIAL LOSSES 
In 2011, Sony lost $170 million due to a 
hack of their PlayStation system. Also 
in 2011, CitiGroup lost $2.7 million and 
AT&T lost $2 million as a result of 
hackers. 
2. LOSS OF INFORMATION 
Hacking often results in a loss of data 
due to files being deleted or changed. 
leak of top secret information could 
cause real-world security issues. 
Servers at the Pentagon, FBI, Interpol 
and NASA have all been compromised at 
various points. various points in the past ten 
years.
1. $171 million – Sony 
2. $2.7 million – Citigroup 
3. $2 million – Stratfor 
4. $2 million – AT&T
1.USA 
2.China 
3.Turkey 
4.Russia 
5.Taiwan 
6.Brazil 
7.Romania 
8.India 
9.Italy 
10.Hungary
Kevin David Mitnick (born August 6, 
1963) is an American computer 
security consultant, author and hacker. In 
1999, he was convicted of various 
computer and communications-related 
crimes. At the time of his arrest, he was the 
most-wanted computer criminal in the 
United States.
Hack

More Related Content

What's hot

Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
Jameel Nabbo
 
Sit presentation
Sit presentationSit presentation
Sit presentation
cchoi02
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
Irvin Costa
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
RAKESH SHARMA
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
Winferno
 
ethical hacking
ethical hackingethical hacking
ethical hacking
Neelima Bawa
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
Vivekanandan M
 
Phishing
PhishingPhishing
Phishing
guicelacatalina
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
Lindsey Landolfi
 
"Hacking"
"Hacking""Hacking"
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
rishirvk1995
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
ClubHack
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
PranavRaj96
 
Digital Security
Digital SecurityDigital Security
Digital Security
CASTAC01
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
aliuet
 

What's hot (19)

Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
 
Phishing
PhishingPhishing
Phishing
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 

Viewers also liked

Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.
Luxury in your Life
 
Realidad universitarya
Realidad universitaryaRealidad universitarya
Realidad universitarya
rkemer_8
 
Manual de usuario
Manual de usuarioManual de usuario
Manual de usuario
hebertecnevarez
 
Wallace phillip 10_2015_resume
Wallace phillip 10_2015_resumeWallace phillip 10_2015_resume
Wallace phillip 10_2015_resume
Phillip Wallace
 
practica 9
practica 9practica 9
practica 9
javierot99
 
Trabajo de metodos
Trabajo de metodosTrabajo de metodos
Trabajo de metodos
rkemer_8
 
Presentacion programas
Presentacion programasPresentacion programas
Presentacion programas
Diuxy Martinez
 
El parlamento de los animales
El parlamento de los animalesEl parlamento de los animales
El parlamento de los animales
MiriamSirvent
 
Database operation di C++
Database operation di C++Database operation di C++
Database operation di C++
FgroupIndonesia
 
Mdia3002 image gallery
Mdia3002 image galleryMdia3002 image gallery
Mdia3002 image gallery
Katherine Joyce Rafaraci
 
Nico. titanic
Nico. titanicNico. titanic
Nico. titanic
AngelGerardo
 
Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)
Bryan Charro
 
practica 6
practica 6practica 6
practica 6
javierot99
 
Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.
javierot99
 
HackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation SlidesHackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation Slides
Elisabeth Fosslien
 
Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015
Mike Helmus
 
ley de la propiedad intelectual
ley de la propiedad intelectualley de la propiedad intelectual
ley de la propiedad intelectual
Rubén García
 
La estadÍstica en el proceso de la investigación científica
La estadÍstica en el proceso de la  investigación científicaLa estadÍstica en el proceso de la  investigación científica
La estadÍstica en el proceso de la investigación científica
MarinaArosemena
 

Viewers also liked (18)

Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.Bullfighting event, with amateur and food.
Bullfighting event, with amateur and food.
 
Realidad universitarya
Realidad universitaryaRealidad universitarya
Realidad universitarya
 
Manual de usuario
Manual de usuarioManual de usuario
Manual de usuario
 
Wallace phillip 10_2015_resume
Wallace phillip 10_2015_resumeWallace phillip 10_2015_resume
Wallace phillip 10_2015_resume
 
practica 9
practica 9practica 9
practica 9
 
Trabajo de metodos
Trabajo de metodosTrabajo de metodos
Trabajo de metodos
 
Presentacion programas
Presentacion programasPresentacion programas
Presentacion programas
 
El parlamento de los animales
El parlamento de los animalesEl parlamento de los animales
El parlamento de los animales
 
Database operation di C++
Database operation di C++Database operation di C++
Database operation di C++
 
Mdia3002 image gallery
Mdia3002 image galleryMdia3002 image gallery
Mdia3002 image gallery
 
Nico. titanic
Nico. titanicNico. titanic
Nico. titanic
 
Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)Centro Diurno Conocoto (grupo 1)
Centro Diurno Conocoto (grupo 1)
 
practica 6
practica 6practica 6
practica 6
 
Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.Practicas 21 22 23 24 y 25.
Practicas 21 22 23 24 y 25.
 
HackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation SlidesHackMIT Liz Fosslien Presentation Slides
HackMIT Liz Fosslien Presentation Slides
 
Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015Sustainability Medical Therapeutics 2015
Sustainability Medical Therapeutics 2015
 
ley de la propiedad intelectual
ley de la propiedad intelectualley de la propiedad intelectual
ley de la propiedad intelectual
 
La estadÍstica en el proceso de la investigación científica
La estadÍstica en el proceso de la  investigación científicaLa estadÍstica en el proceso de la  investigación científica
La estadÍstica en el proceso de la investigación científica
 

Similar to Hack

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
dineshgarhwal77
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
karthickB24
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
shreyas dani
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
sagarpanthee
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Hacking
HackingHacking
Hacking
Virus
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Martha Brown
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
Daniel Ross
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 

Similar to Hack (20)

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Network security
Network securityNetwork security
Network security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Hack

  • 2. 1. Hacking refers to the activities which are done to intrude someone else’s personal information so as to use it for malicious, unwanted purposes. WHAT IS HACKING ? 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks.
  • 3. A typical attacker works in the following manner: Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
  • 4. When someone hacks a computer or network system, it's typically for one of the following reasons: 1. Credit Card Information(for money) In recent years it has become increasingly possible for hackers to steal credit card information. With online shopping and online banking becoming more prevalent, the opportunity for a skilled hacker to acquire credit card information continues to grow.
  • 5. 2. Identity Theft Hackers can potentially steal identity by simply hacking into a computer. With a stolen identity, a hacker can do almost everything. 3. Business Information In the modern world it is not at all uncommon for incredibly important business information to be stored on computers. Hackers can steal financial information, account numbers, and even client information. 4. Egotism Some hackers hack computers solely to prove that they can. These individuals may do anything from small-scale hacking all the way up to full-on identity.
  • 6. 1. FINANCIAL LOSSES In 2011, Sony lost $170 million due to a hack of their PlayStation system. Also in 2011, CitiGroup lost $2.7 million and AT&T lost $2 million as a result of hackers. 2. LOSS OF INFORMATION Hacking often results in a loss of data due to files being deleted or changed. leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points. various points in the past ten years.
  • 7. 1. $171 million – Sony 2. $2.7 million – Citigroup 3. $2 million – Stratfor 4. $2 million – AT&T
  • 8. 1.USA 2.China 3.Turkey 4.Russia 5.Taiwan 6.Brazil 7.Romania 8.India 9.Italy 10.Hungary
  • 9. Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author and hacker. In 1999, he was convicted of various computer and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.