SlideShare a Scribd company logo
1 of 12
HACKING & PRIVACY
Modern threats to data
Presented by :
Bahaar Abdullah ( BITFI8M033)
 Hacking generally refers to unauthorized
intrusion into a computer or a network .
 The person who hacks is Hacker. They are of
many types.
 Hacking may include unauthorized access to
your sensitive data.
 Hacking refers to track into the system and use
the data for malicious purposes
 Privacy issues are using the data for illegal
purposes
 Privacy threats may include cracking and break
into sensitive information
Hackers & Crackers
 Hackers can be authentic and ethical
 A Hacker may intrude into the system at permission
 Hackers usually don’t have self gain greed
 Crackers always keep malicious intensions
 The Crackers are not authentic
 Crackers always keep perceive intensions of self gain
Types of Hackers Types of Crackers
• White Hat Hackers
• Black Hat Hackers
• Grey Hat Hackers
• Blue Hat Hackers
• Hacktivist (cyberterrorism )
• Script kiddies
• Packet monkeys
• s’kiddiots
• Lamers
• Warez d00dz (dudes)
TYPES OF HACKING
 Website Hacking
 Email Hacking
 Network Hacking
 Password enrolment
 Cyber intruding
 Industrial data Hacking
 Devises Hacking
 Ethical Hacking
Motivation for Hackers and Crackers
 Curiosity
 Boredom (fed up)
 Vandalism ( fetching forcely)
 Revenge
 Financial gain
 Blackmailing
 Bragging
Hacker
Curiosity
Financial
gain
vandalism
revenge
Cyber Threats
 Cyber security
 Hacking
 Cyber Espionage (spying)
 Networking threats
 Information leakage
 Exploit sites
WAYS OF HACKING and
Cracking
 Trojan horse
 Viruses
 Spam Emails
 PoP up adds
 Automatic security updates
 Denial of Service
 Cookie theft
 Fake links
Great Cyber Attacks In The History Of
Pakistan
 Karachi Bank Islami ($6 million loss)
 The ‘almost all Pakistani banks ‘ Cyber Hacking attack in 2016
 Logic bomb virus attack
 World Trade Centre attack ( 9/11)
Security Measures
 Keeping a unique password
 Check for system updation
 Don’t interest in spam emails and sites
 Keep backing up data at normal premises
 Avoid public WiFi
 Don’t share debit and credit card info via email
o https://antivirus.comodo.com/blog/comodo-news/hacking-
definition-and-its-types/
o https://www.google.com/search?q=cyber+attacks+graph
o https://www.dummies.com/programming/networking
o https://searchsecurity.techtarget.com/
References and Motivations
Hacking and privacy threats

More Related Content

What's hot

2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the HumanPhishLabs
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - VaronisHarry Gunns
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingjustyogesh
 
Hacking & cyber Security
Hacking & cyber SecurityHacking & cyber Security
Hacking & cyber Securityvishal waghmare
 
cyber security & hacking
cyber security & hackingcyber security & hacking
cyber security & hackingvishal waghmare
 
Information gathering
Information gatheringInformation gathering
Information gatheringMaulik Kotak
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 

What's hot (19)

2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - Varonis
 
Hacker
HackerHacker
Hacker
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking - A Technical Threat
Hacking - A Technical ThreatHacking - A Technical Threat
Hacking - A Technical Threat
 
Phishing
PhishingPhishing
Phishing
 
Hacking 2018
Hacking 2018Hacking 2018
Hacking 2018
 
Hacking
HackingHacking
Hacking
 
Hacking & cyber Security
Hacking & cyber SecurityHacking & cyber Security
Hacking & cyber Security
 
cyber security & hacking
cyber security & hackingcyber security & hacking
cyber security & hacking
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Dark web
Dark webDark web
Dark web
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Hacking and privacy threats

Similar to Hacking and privacy threats (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Hacking
HackingHacking
Hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Hacking and privacy threats

  • 1. HACKING & PRIVACY Modern threats to data Presented by : Bahaar Abdullah ( BITFI8M033)
  • 2.  Hacking generally refers to unauthorized intrusion into a computer or a network .  The person who hacks is Hacker. They are of many types.  Hacking may include unauthorized access to your sensitive data.  Hacking refers to track into the system and use the data for malicious purposes  Privacy issues are using the data for illegal purposes  Privacy threats may include cracking and break into sensitive information
  • 3. Hackers & Crackers  Hackers can be authentic and ethical  A Hacker may intrude into the system at permission  Hackers usually don’t have self gain greed  Crackers always keep malicious intensions  The Crackers are not authentic  Crackers always keep perceive intensions of self gain
  • 4. Types of Hackers Types of Crackers • White Hat Hackers • Black Hat Hackers • Grey Hat Hackers • Blue Hat Hackers • Hacktivist (cyberterrorism ) • Script kiddies • Packet monkeys • s’kiddiots • Lamers • Warez d00dz (dudes)
  • 5. TYPES OF HACKING  Website Hacking  Email Hacking  Network Hacking  Password enrolment  Cyber intruding  Industrial data Hacking  Devises Hacking  Ethical Hacking
  • 6. Motivation for Hackers and Crackers  Curiosity  Boredom (fed up)  Vandalism ( fetching forcely)  Revenge  Financial gain  Blackmailing  Bragging Hacker Curiosity Financial gain vandalism revenge
  • 7. Cyber Threats  Cyber security  Hacking  Cyber Espionage (spying)  Networking threats  Information leakage  Exploit sites
  • 8. WAYS OF HACKING and Cracking  Trojan horse  Viruses  Spam Emails  PoP up adds  Automatic security updates  Denial of Service  Cookie theft  Fake links
  • 9. Great Cyber Attacks In The History Of Pakistan  Karachi Bank Islami ($6 million loss)  The ‘almost all Pakistani banks ‘ Cyber Hacking attack in 2016  Logic bomb virus attack  World Trade Centre attack ( 9/11)
  • 10. Security Measures  Keeping a unique password  Check for system updation  Don’t interest in spam emails and sites  Keep backing up data at normal premises  Avoid public WiFi  Don’t share debit and credit card info via email
  • 11. o https://antivirus.comodo.com/blog/comodo-news/hacking- definition-and-its-types/ o https://www.google.com/search?q=cyber+attacks+graph o https://www.dummies.com/programming/networking o https://searchsecurity.techtarget.com/ References and Motivations