SlideShare a Scribd company logo
COMPUTER CRIME
Eldo Raju N
 The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called
Hacking.
Hacker: In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a computer
system or computer network.
Website Hacking
Network Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
 Ethical Hacking
 Website Hacking : Hacking a website means taking control from the website owner to
a person who hacks the website.
 Network Hacking : Network Hacking is generally means gathering information about
domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the
network.
 Email Hacking: Email hacking is unauthorized access to an email account or email
correspondence.
 Password Hacking : Password Hacking Password cracking is the process of recovering
secret passwords from data that has been stored in or transmitted by a computer
system
 Online Banking Hacking: Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without permission of account holder is
known as Online banking hacking.
 Computer Hacking: Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
 Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a
system and then usually patches them.
 Thrill-Seeker Hacker: Person who break into a computer system for
entertainment the reward is usually admiration of their fellow hackers
 White-Hat Hackers: The hackers who legitimately , with the knowledge of the
owners of the IT system, try to break in to find and fix vulnerable area of the
system. They are also called ethical Hackers, counter hackers or penetration
hackers.
 Black-Hat Hackers : They exploit or destroy the information they find steal
passwords, or otherwise cause harm to the computer network for some benefits
 Hacktivist : Are politically motivated hackers who use the internet to send a
political message of some kind.
Eg: Indian government sites are hacked by Pakistan hackers for political gain
 Cyber terrorists: is one who seeks to cause harm to people or destroy critical
systems or information. Possible targets of violent attacks would be air traffic
control systems and nuclear power plants, or anything that could harm the
infrastructure of a nation.
 Using Firewalls
 Using Anti Virus Software
 Restrict software installation
 Change default passwords on systems and devices
 Do not use official email ID to subscribe to public groups
 Data encryption
 Do not expose your passwords to untrusted websites
 Practice to use exact web address
 Turn off your internet connection when not in use
CONSEQUENCES OF
HACKING
 Thousands of rupees in fines
 Imprisonment
 Seizure of your computer and hardware
Hacking computer crime

More Related Content

What's hot

Hacking
HackingHacking
Hacking
Sitwat Rao
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
 
Hacking
HackingHacking
Hacking
j naga sai
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
soukigirishkumar1
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker PlagueLuke Perrin
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
Bharath Reddy
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
ABIN VARGHESE
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
justyogesh
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
dineshgarhwal77
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 

Viewers also liked

Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
Peter Timusk
 
Sneider bolaños gómez
Sneider bolaños gómezSneider bolaños gómez
Sneider bolaños gómez
Esneider279411
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Jacqueline Fick
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
Skybox Security
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
PAF KIET
 
Intertextuality
IntertextualityIntertextuality
Intertextuality
Victory Media
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
đại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giáđại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giádoreatha356
 
Eth pdf
Eth pdfEth pdf
Eth pdf
funwithu
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01Dil Nawaz
 
Sistema solar
Sistema solarSistema solar
Sistema solar
primariaere
 
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcmbáo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcmfreeman378
 
Steve Bagi CSM article
Steve Bagi CSM articleSteve Bagi CSM article
Steve Bagi CSM articleSteve Bagi
 
C# Desktop. Занятие 01.
C# Desktop. Занятие 01.C# Desktop. Занятие 01.
C# Desktop. Занятие 01.
Igor Shkulipa
 
JavaScript Базовый. Занятие 02.
JavaScript Базовый. Занятие 02.JavaScript Базовый. Занятие 02.
JavaScript Базовый. Занятие 02.
Igor Shkulipa
 

Viewers also liked (20)

Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Sneider bolaños gómez
Sneider bolaños gómezSneider bolaños gómez
Sneider bolaños gómez
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
Intertextuality
IntertextualityIntertextuality
Intertextuality
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
đại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giáđại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giá
 
Eth pdf
Eth pdfEth pdf
Eth pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01
 
Sistema solar
Sistema solarSistema solar
Sistema solar
 
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcmbáo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
 
Trailblazers - Ensuring Independence in Assessment
Trailblazers - Ensuring Independence in AssessmentTrailblazers - Ensuring Independence in Assessment
Trailblazers - Ensuring Independence in Assessment
 
Steve Bagi CSM article
Steve Bagi CSM articleSteve Bagi CSM article
Steve Bagi CSM article
 
C# Desktop. Занятие 01.
C# Desktop. Занятие 01.C# Desktop. Занятие 01.
C# Desktop. Занятие 01.
 
JavaScript Базовый. Занятие 02.
JavaScript Базовый. Занятие 02.JavaScript Базовый. Занятие 02.
JavaScript Базовый. Занятие 02.
 

Similar to Hacking computer crime

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
BareetSingh
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
HACKING
HACKINGHACKING
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
 
Hacking
Hacking Hacking
Hacking
Nafeesa Naeem
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
RavinderSingh172970
 
Hacking
HackingHacking
Hacking
akam bajalan
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Midhun
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
Sunipa Bera
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
RahulPandey671759
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Hacking
HackingHacking
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 

Similar to Hacking computer crime (20)

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
HACKING
HACKINGHACKING
HACKING
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking
Hacking Hacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 

Recently uploaded (20)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 

Hacking computer crime

  • 2.  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. Hacker: In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
  • 3. Website Hacking Network Hacking Email Hacking Password Hacking Online Banking Hacking Computer Hacking  Ethical Hacking
  • 4.  Website Hacking : Hacking a website means taking control from the website owner to a person who hacks the website.  Network Hacking : Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.  Email Hacking: Email hacking is unauthorized access to an email account or email correspondence.  Password Hacking : Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system  Online Banking Hacking: Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  Computer Hacking: Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 5.  Thrill-Seeker Hacker: Person who break into a computer system for entertainment the reward is usually admiration of their fellow hackers  White-Hat Hackers: The hackers who legitimately , with the knowledge of the owners of the IT system, try to break in to find and fix vulnerable area of the system. They are also called ethical Hackers, counter hackers or penetration hackers.  Black-Hat Hackers : They exploit or destroy the information they find steal passwords, or otherwise cause harm to the computer network for some benefits  Hacktivist : Are politically motivated hackers who use the internet to send a political message of some kind. Eg: Indian government sites are hacked by Pakistan hackers for political gain  Cyber terrorists: is one who seeks to cause harm to people or destroy critical systems or information. Possible targets of violent attacks would be air traffic control systems and nuclear power plants, or anything that could harm the infrastructure of a nation.
  • 6.  Using Firewalls  Using Anti Virus Software  Restrict software installation  Change default passwords on systems and devices  Do not use official email ID to subscribe to public groups  Data encryption  Do not expose your passwords to untrusted websites  Practice to use exact web address  Turn off your internet connection when not in use
  • 7. CONSEQUENCES OF HACKING  Thousands of rupees in fines  Imprisonment  Seizure of your computer and hardware