SlideShare a Scribd company logo
COMPUTER
SECURITY &
ETHICS
Chapter 06
Hacker
Cracker
Cyber Crime
Computer Security is:
1. Protecting computer hardware ,software and
information stored on computer from threats .
Importance of Computer Security :
Computer security or safety Is important for computer
users to protect their computer from different threats .
It is necessary to install security software such as firewall
,antivirus and spyware on computers.
COMPUTER SECURITY
 Any crime that is committed by the means
of computer and internet technology by
having access to others computer .
 Criminals use computer and internet
technology to harm the society .
 Commonly committed crimes :
 Crimes such as fraud ,kidnapping ,murder
and crimes related with stealing money from
bank and credit card company .
 Download illegal software ,music files and
videos are also cybercrimes .
CYBERCRIME
Internet harassment and cyber bullying is also
serious committed crimes by cybercriminals .
• Threatening email
• Spreading rumors or virus
• Defamatory comments or any other form of bad
material( photos, videos)
• All above are the crimes done by cybercriminals
.
COMMONLY COMMITTED CRIMES
Hackers have in-depth knowledge of network programming.and
can create tools and malicious software for others to break into
networks and create problems.
Hackers computer experts try to gain
unauthorized access to computer system for
stealing and corrupting information .
Copy paste the link and watch the you tube video
regarding hacking
https://www.youtube.com/watch?v=9juhDTsmyTI
HACKERS
Cracker is a computer user do not have professional
computer skill to hack computer systems but they
have knowledge about using hacking tools
Crackers break into computers and cause
serious damage .they also break into web
servers and replace the homepage with a
page they have designed on their own . Short
video how key loggers are use
https://searchsecurity.techtarget.com/definiti
on/keylogger
CRACKER
HACKER CRACKER
HACKER
A person who illegally
breaks into
others’ computer
systems is known
as hacker.
Cracker is a computer
user
who breaks into
computer
system without
permission
using hacking tools for
personal gain or
damage.
HACKER AND CRACKER
Solve the following questions :
1.Define Cybercrime ?
2.What is the importance of
computer security ?
3.Differentiate between hacker
and cracker.
4.Write down in detail the
example of hacker and cracker
(1 for each)
ASSIGNMENT
Refer text
book pg.
158-160
HINT

More Related Content

What's hot

Hacking
HackingHacking
Hacking
Asma Khan
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
Sarika Dyne
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Attack types
Attack typesAttack types
Attack types
S.M. Towhidul Islam
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Hacker
HackerHacker
Hacker
Ramasubbu .P
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingAitezaz Mohsin
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
 
Hacking
HackingHacking
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
Hacking
HackingHacking
Hacking
Arpit Verma
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Attack types
Attack typesAttack types
Attack types
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacker
HackerHacker
Hacker
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking
HackingHacking
Hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Hacking
HackingHacking
Hacking
 

Similar to Hacker cracker cybercrime-computer security

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
Armand Hacking
Armand HackingArmand Hacking
Armand Hackingarmand
 
Cyber crime
Cyber crimeCyber crime
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
Alefya1
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 

Similar to Hacker cracker cybercrime-computer security (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Armand Hacking
Armand HackingArmand Hacking
Armand Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Computer security
Computer securityComputer security
Computer security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Network security
Network securityNetwork security
Network security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 

More from ShouaQureshi

touchscreens
touchscreenstouchscreens
touchscreens
ShouaQureshi
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
ShouaQureshi
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
ShouaQureshi
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
ShouaQureshi
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
ShouaQureshi
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
ShouaQureshi
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
ShouaQureshi
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
ShouaQureshi
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
ShouaQureshi
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
ShouaQureshi
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
ShouaQureshi
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
ShouaQureshi
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
ShouaQureshi
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
ShouaQureshi
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
ShouaQureshi
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
ShouaQureshi
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
ShouaQureshi
 

More from ShouaQureshi (18)

touchscreens
touchscreenstouchscreens
touchscreens
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 

Hacker cracker cybercrime-computer security

  • 2. Computer Security is: 1. Protecting computer hardware ,software and information stored on computer from threats . Importance of Computer Security : Computer security or safety Is important for computer users to protect their computer from different threats . It is necessary to install security software such as firewall ,antivirus and spyware on computers. COMPUTER SECURITY
  • 3.  Any crime that is committed by the means of computer and internet technology by having access to others computer .  Criminals use computer and internet technology to harm the society .  Commonly committed crimes :  Crimes such as fraud ,kidnapping ,murder and crimes related with stealing money from bank and credit card company .  Download illegal software ,music files and videos are also cybercrimes . CYBERCRIME
  • 4. Internet harassment and cyber bullying is also serious committed crimes by cybercriminals . • Threatening email • Spreading rumors or virus • Defamatory comments or any other form of bad material( photos, videos) • All above are the crimes done by cybercriminals . COMMONLY COMMITTED CRIMES
  • 5. Hackers have in-depth knowledge of network programming.and can create tools and malicious software for others to break into networks and create problems. Hackers computer experts try to gain unauthorized access to computer system for stealing and corrupting information . Copy paste the link and watch the you tube video regarding hacking https://www.youtube.com/watch?v=9juhDTsmyTI HACKERS
  • 6. Cracker is a computer user do not have professional computer skill to hack computer systems but they have knowledge about using hacking tools Crackers break into computers and cause serious damage .they also break into web servers and replace the homepage with a page they have designed on their own . Short video how key loggers are use https://searchsecurity.techtarget.com/definiti on/keylogger CRACKER
  • 7. HACKER CRACKER HACKER A person who illegally breaks into others’ computer systems is known as hacker. Cracker is a computer user who breaks into computer system without permission using hacking tools for personal gain or damage. HACKER AND CRACKER
  • 8. Solve the following questions : 1.Define Cybercrime ? 2.What is the importance of computer security ? 3.Differentiate between hacker and cracker. 4.Write down in detail the example of hacker and cracker (1 for each) ASSIGNMENT Refer text book pg. 158-160 HINT