SlideShare a Scribd company logo
Hacking
MADE BY : NAVEEN NAKKA
ROLL NO. : 13765A1007
CLASS: 3rd
YEAR
1. Introduction
2. General Hacking Methods
3. Why do Hackers Hack
4. Negative Effects of Hackers
5. Losses Due to Hackers
6. History of Hackers
7. Top 10 Countries with most Hackers
8. Missuse of Hacking Technology
What is Hacking ?
1.Hacking refers to
the activities which
are done to intrude
some one else’s
personal information
so as to use it for
malicious, unwanted
purposes.
2. Hacking is a term which refers to the activities aimed
at exploiting security flaws to obtain personal information
for gaining access to secured networks.
A typical attacker works in the following manner:
Identify the target system.
Gathering Information on the target system.
Finding a possible loophole in the target system.
Exploiting this loophole using exploit code.
Removing all traces from the log files and escaping without a trace.
When someone hacks a computer or
network system, it's typically for one of
the following reasons:
1. Credit Card Information(for money)
In recent years it has become increasingly possible for
hackers to steal credit card information. With online
shopping and online banking becoming more prevalent, the
opportunity for a skilled hacker to acquire credit card
information continues to grow.
2. Identity Theft
Hackers can potentially steal
identity by simply hacking into a
computer. With a stolen identity,
a hacker can do almost everything.
3. Business Information
In the modern world it is not at all uncommon for incredibly
important business information to be stored on computers.
Hackers can steal financial information, account numbers,
and even client information.
4. Egotism
Some hackers hack computers solely to prove that they can.
These individuals may do anything from small-scale hacking
all the way up to full-on identity.
1. FINANCIAL LOSSES
In 2011, Sony lost $170 million due to a
hack of their PlayStation system. Also
in 2011, CitiGroup lost $2.7 million and
AT&T lost $2 million as a result of
hackers.
2. LOSS OF INFORMATION
Hacking often results in a loss of data
due to files being deleted or changed.
leak of top secret information could
cause real-world security issues.
Servers at the Pentagon, FBI, Interpol
and NASA have all been compromised at
various points. various points in the past ten
years.
1. $171 million – Sony
2. $2.7 million – Citigroup
3. $2 million – Stratfor
4. $2 million – AT&T
 1980s
- Cyberspacecoined
-414 arrested
-Two hackergroups formed
-2600published
 1990s
-NationalCrackdownonhackers
-KevinMitnick arrested
-Microsoft’sNToperating system pierced
Late 1990s
Hackers break into and defacefederal Web
sites, including the U.S. Department of Justice,
U.S. Air Force, CIA, NASA and others.
2013,India : Rs 2.4 crore heist by cyber
criminals who hacked into the Mumbai-based
current account of the RPG Group of
companies.
2011 ,Japan: Sony PlayStation Network Hack To
Cost $170 Million.
1.USA
2.China
3.Turkey
4.Russia
5.Taiwan
6.Brazil
7.Romania
8.India
9.Italy
10.Hungary
Missuse of Hacking Technology
Degree of
Computer
Crime
Amount of Damage or Harm
Required
Penalty
1st
 degree Damage to or the value of the property or
computer services is over $10,000
B felony (up to 20 years in
prison, a fine of up to $15,000,
or both)
2nd
 degree Damage to or the value of the property or
computer services is over $5,000
C felony (up to 10 years in
prison, a fine of up to $10,000,
or both)
3rd
 degree ● Damage to or the value of the property or
computer services is over $1,000
● Reckless conduct that creates a risk of
serious physical injury to another person
D felony (up to five years in
prison, a fine of up to $5,000, or
both)
4th
 degree Damage to or the value of the property or
computer services is over $500
A misdemeanor (up to one year
in prison, a fine of up to $2,000,
or both)
5th
 degree Damage to or the value of the property or
computer services, if any, is $500 or less
B misdemeanor (up to six
months in prison, a fine of up to
$1,000, or both)
Thank you
Thanks for your attention…!!!
Any Queries ??

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
Hacking Hacking
Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Hacking
HackingHacking
Hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 

Viewers also liked

Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
Yam Peleg
 
5g presentation
5g presentation5g presentation
5g presentation
shreya_omar
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
Yusuf Shaik
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
kajol agarwal
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Sauraha presentation
Sauraha presentationSauraha presentation
Sauraha presentationedmnepal
 
power line networking by ajay dilish
power line networking by ajay dilishpower line networking by ajay dilish
power line networking by ajay dilish
Ajay Dilish
 
Travel hacking presentation
Travel hacking presentationTravel hacking presentation
Travel hacking presentation
Aaron Wong
 
Laxman radio PPT
Laxman radio PPTLaxman radio PPT
Laxman radio PPT
Parikshit Kuldiya
 
New microsoft office power point presentation copy
New microsoft office power point presentation   copyNew microsoft office power point presentation   copy
New microsoft office power point presentation copykor
 
Wildlife conservation
Wildlife conservationWildlife conservation
Wildlife conservation
Harsh Kalode
 
Mangalam college
Mangalam collegeMangalam college
Mangalam college
ponnu1
 
Presentation on "Dell Corporation"
Presentation on "Dell Corporation"Presentation on "Dell Corporation"
Presentation on "Dell Corporation"Rafiqul Alam Khan
 
Stealth tech
Stealth techStealth tech
Stealth tech
Nandini Nagaraj
 
presentppt
presentpptpresentppt
presentppt
danielng0127
 
Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop) Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop)
Sudhanshu Purohit
 

Viewers also liked (20)

Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
5g presentation
5g presentation5g presentation
5g presentation
 
all india radio ppt
all india radio pptall india radio ppt
all india radio ppt
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Sauraha presentation
Sauraha presentationSauraha presentation
Sauraha presentation
 
power line networking by ajay dilish
power line networking by ajay dilishpower line networking by ajay dilish
power line networking by ajay dilish
 
Travel hacking presentation
Travel hacking presentationTravel hacking presentation
Travel hacking presentation
 
Laxman radio PPT
Laxman radio PPTLaxman radio PPT
Laxman radio PPT
 
New microsoft office power point presentation copy
New microsoft office power point presentation   copyNew microsoft office power point presentation   copy
New microsoft office power point presentation copy
 
Wildlife conservation
Wildlife conservationWildlife conservation
Wildlife conservation
 
Mangalam college
Mangalam collegeMangalam college
Mangalam college
 
Presentation on "Dell Corporation"
Presentation on "Dell Corporation"Presentation on "Dell Corporation"
Presentation on "Dell Corporation"
 
Stealth tech
Stealth techStealth tech
Stealth tech
 
presentppt
presentpptpresentppt
presentppt
 
Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop) Ongc ppt (1) (maintenance workshop)
Ongc ppt (1) (maintenance workshop)
 

Similar to Hacking presentation BASIC

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
dineshgarhwal77
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
karthickB24
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
shreyas dani
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
sagarpanthee
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
Hacking
HackingHacking
Hacking
Virus
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
DivithC
 

Similar to Hacking presentation BASIC (20)

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hack
HackHack
Hack
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Network security
Network securityNetwork security
Network security
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 

Recently uploaded (20)

Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 

Hacking presentation BASIC

  • 1. Hacking MADE BY : NAVEEN NAKKA ROLL NO. : 13765A1007 CLASS: 3rd YEAR
  • 2. 1. Introduction 2. General Hacking Methods 3. Why do Hackers Hack 4. Negative Effects of Hackers 5. Losses Due to Hackers 6. History of Hackers 7. Top 10 Countries with most Hackers 8. Missuse of Hacking Technology
  • 3. What is Hacking ? 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks.
  • 4. A typical attacker works in the following manner: Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
  • 5. When someone hacks a computer or network system, it's typically for one of the following reasons: 1. Credit Card Information(for money) In recent years it has become increasingly possible for hackers to steal credit card information. With online shopping and online banking becoming more prevalent, the opportunity for a skilled hacker to acquire credit card information continues to grow.
  • 6. 2. Identity Theft Hackers can potentially steal identity by simply hacking into a computer. With a stolen identity, a hacker can do almost everything. 3. Business Information In the modern world it is not at all uncommon for incredibly important business information to be stored on computers. Hackers can steal financial information, account numbers, and even client information. 4. Egotism Some hackers hack computers solely to prove that they can. These individuals may do anything from small-scale hacking all the way up to full-on identity.
  • 7. 1. FINANCIAL LOSSES In 2011, Sony lost $170 million due to a hack of their PlayStation system. Also in 2011, CitiGroup lost $2.7 million and AT&T lost $2 million as a result of hackers. 2. LOSS OF INFORMATION Hacking often results in a loss of data due to files being deleted or changed. leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points. various points in the past ten years.
  • 8. 1. $171 million – Sony 2. $2.7 million – Citigroup 3. $2 million – Stratfor 4. $2 million – AT&T
  • 9.  1980s - Cyberspacecoined -414 arrested -Two hackergroups formed -2600published  1990s -NationalCrackdownonhackers -KevinMitnick arrested -Microsoft’sNToperating system pierced
  • 10. Late 1990s Hackers break into and defacefederal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. 2013,India : Rs 2.4 crore heist by cyber criminals who hacked into the Mumbai-based current account of the RPG Group of companies. 2011 ,Japan: Sony PlayStation Network Hack To Cost $170 Million.
  • 12. Missuse of Hacking Technology Degree of Computer Crime Amount of Damage or Harm Required Penalty 1st  degree Damage to or the value of the property or computer services is over $10,000 B felony (up to 20 years in prison, a fine of up to $15,000, or both) 2nd  degree Damage to or the value of the property or computer services is over $5,000 C felony (up to 10 years in prison, a fine of up to $10,000, or both) 3rd  degree ● Damage to or the value of the property or computer services is over $1,000 ● Reckless conduct that creates a risk of serious physical injury to another person D felony (up to five years in prison, a fine of up to $5,000, or both) 4th  degree Damage to or the value of the property or computer services is over $500 A misdemeanor (up to one year in prison, a fine of up to $2,000, or both) 5th  degree Damage to or the value of the property or computer services, if any, is $500 or less B misdemeanor (up to six months in prison, a fine of up to $1,000, or both)
  • 14. Thanks for your attention…!!! Any Queries ??