Hacking
-the art of deceiving
• History of Hacking
• What is Hacking?
• Who is a Hacker?
• Hacker Types
• Hacking Techniques
• Major Hackers in the history
• Major hacks happened around world
• Advantages
• Disadvantages
• How to secure our data?
Contents
History
 The very first hack came in 1878 at
Bell Telephone.
 Started in 1960, at MIT.
 Hacking increased due to invention
of UNIX.
What is Hacking?
 Act of finding the possible entry points that
exist in a computer or in a network and finally
entering into them.
 Usually done to gain unauthorized access to a
computer to harm the systems or to steal sensitive
information available on the computer.
 In the computer security context, a hacker is
someone who seeks and exploit weakness in a
computer or in a network.
 The term hackers is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a CRACKER.
Who is a Hacker?
Hacker Types
o Black Hat Hackers
o Grey Hat Hackers
o White Hat Hackers
Hacking Techniques
 Bait and switch
 Click Jacking Attacks
 Eavesdropping (Passive Attacks)
 Fake WAP
 Waterhole attacks
 Phishing
 Denial of Service (DoSDDoS)
 Key Logger
 Ransom Ware
Major Hackers in the history
Gary
McKinnon
Samy
Kamkar
Kevin
Mitnick
Linus
Torvalds
Major hacks happened around world
Ransom ware Attack on 12 May 2017
Mark Zuckerberg's Facebook page hacked by
Khalil Shreateh
Advantages
 Testing security measures
 Detects bugs and weakness in software
 Allow nations to spy on other nations
 Hackers helped make your PC
 Can make you a good programmer
 Recovering lost information
Disadvantages
 Illegal
 Can harm someone’s privacy
 Criminals use it to their advantage
 Unauthorized access to private
information isn’t good
How to secure our data?
 Keep Your Firewall Turned On
 Install or Update Your Antivirus Software
 Keep Your Operating System Up to Date
 Be Careful What You Download
 Create unique passwords
 Do not use open Wi-Fi
if ( anyQuestions == 1 ){
ask();
}
else {
Printf(“ <ThankYou/> ”);
}

Hacking

  • 1.
  • 2.
    • History ofHacking • What is Hacking? • Who is a Hacker? • Hacker Types • Hacking Techniques • Major Hackers in the history • Major hacks happened around world • Advantages • Disadvantages • How to secure our data? Contents
  • 3.
    History  The veryfirst hack came in 1878 at Bell Telephone.  Started in 1960, at MIT.  Hacking increased due to invention of UNIX.
  • 4.
    What is Hacking? Act of finding the possible entry points that exist in a computer or in a network and finally entering into them.  Usually done to gain unauthorized access to a computer to harm the systems or to steal sensitive information available on the computer.
  • 5.
     In thecomputer security context, a hacker is someone who seeks and exploit weakness in a computer or in a network.  The term hackers is reclaimed by computer programmers who argue that someone breaking into computers is better called a CRACKER. Who is a Hacker?
  • 6.
    Hacker Types o BlackHat Hackers o Grey Hat Hackers o White Hat Hackers
  • 7.
    Hacking Techniques  Baitand switch  Click Jacking Attacks  Eavesdropping (Passive Attacks)  Fake WAP  Waterhole attacks  Phishing  Denial of Service (DoSDDoS)  Key Logger  Ransom Ware
  • 8.
    Major Hackers inthe history Gary McKinnon Samy Kamkar Kevin Mitnick Linus Torvalds
  • 9.
    Major hacks happenedaround world Ransom ware Attack on 12 May 2017
  • 10.
    Mark Zuckerberg's Facebookpage hacked by Khalil Shreateh
  • 11.
    Advantages  Testing securitymeasures  Detects bugs and weakness in software  Allow nations to spy on other nations  Hackers helped make your PC  Can make you a good programmer  Recovering lost information
  • 12.
    Disadvantages  Illegal  Canharm someone’s privacy  Criminals use it to their advantage  Unauthorized access to private information isn’t good
  • 13.
    How to secureour data?  Keep Your Firewall Turned On  Install or Update Your Antivirus Software  Keep Your Operating System Up to Date  Be Careful What You Download  Create unique passwords  Do not use open Wi-Fi
  • 14.
    if ( anyQuestions== 1 ){ ask(); } else { Printf(“ <ThankYou/> ”); }