SlideShare a Scribd company logo
Lecture 17
Introduction to Hacking
WHAT IS NETWORK SECURITY?
• Security is much larger than just packets, firewalls,
and hackers. Security includes:
– Policies and procedures
– Liabilities and laws
– Human behavior patterns
– Corporate security programs and implementation
– Technical aspects- firewalls, intrusion detection systems,
proxies, encryption, antivirus software, hacks, cracks, and
attacks
• Understanding hacking tools and how attacks are
carried out is only one piece of the puzzle.
2
Hacking
 THE PROCESS OF ATTEMPTING TO GAIN OR
SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO
COMPUTER RESOURCES FOR THE PURPOSE OF HELP
OR SECURE SYSTEM IS CALLED HACKING
HISTORY OF HACKING
1966 – ROBERT MORRIS INTRODUCES THE
CONCEPT OF SAFE HACKING.
1969 – DEVELOPMENT IN THE FIELD OF
HACKING.
1990 – ELECTRONIC FRONTIER FOUNDATION
WAS FOUNDED.
1995 – MARK ANDREESSON & ERIC RELEASE
MOSAIC.
WHO IS HACKER?
 HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY
INTELLIGENT PERSON WHO USES HIS KNOWLEDGE
IN CONSTRUCTIVE MANNER TO SECURE SYSTEM &
NEVER DAMAGE DATA
 HE KNOWS ALL ABOUT THE OPERATING SYSTEM &
DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER?
 PERSON WHO ENTER INTO OTHER’S SYSTEM AND
VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE
HAVOC IS CALLED CRACKER
 CRACKER IS CYBER CRIMINAL
 THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR
ACTIONS ARE MALICIOUS
WHY DO CRACKERS EXIST?
 CRACKERS EXIST BECAUSE HUMAN NATURE IS JUST
SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF
CREATE
 THEY ARE USED FOR DIFFERENT PURPOSES LIKE FOR
PROFIT,SOME COMPANY USE THEM FOR DISABLING
THE COMPITITOR COMPANY, FOR CRACKING CREDIT
CARD NUMBER
DIFFERENCE BETWEEN HACKER &
CRACKER
 HACKER’S PROGRAMS TO
CHECK INTIGRITY OF OTHER
PROGRAMS.THUS WHEN
HACKERS CREATE PROGRAM
IT AUTOMATICALLY CHECKS
REMOTE MACHINE
SECURITY STRUCTURE
 THEY ALWAYS DO
CONTRUCTIVE WORK
 CRACKERS RARELY MAKE
THEIR OWN PROGRAM
.INSTEAD ,THEY STEAL
TOOL,PROGRAMS FROM
OTHERS
 CRACKERS CREATES
NOTHING & DESTROY
MUCH
WHICH OPERATING SYSTEM HACKER USE
SUN
UNIX
MICROSOFT
SUN
HACKERS Use EITHER SOLARIC X86 OR SCO AS
A PLATFORM.
THIS IS BECAUSE THESE PRODUCTS ARE
LICENSED WARE & THEY CAN EASILY BE
OBTAINED.
UNIX
POPULAR PLATFORM BECAUSE THEY
REQUIRED A LOW OVERHEAD.
WE CAN RUN LINUX ON A PALTRAY 386 AND
GAIN GOOD PERFORMANCE.
THIS IS REASONABLE.
MICROSOFT
THIS SUPPORTS MANY SECURITY TOOLS THAT
CAN BE USED TO ATTACK REMOTE MACHINE.
IT HAS ADVANCED TOOLS FOR NETWORKING
AS WELL.

More Related Content

What's hot

Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
RAKESH SHARMA
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
Irvin Costa
 
Hacking
HackingHacking
Hacking
Haider Akbar
 
Hacking
HackingHacking
Hacking
LutfulM
 
My presentation
My presentationMy presentation
My presentation
sa12chindra
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
pavankumarmangena
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
abdul talha
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseItai Bass
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
SoundaryaB2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Muktadir Shoaib
 
Hacking
HackingHacking
Internet security
Internet securityInternet security
Internet security
Reisn Felicite
 
Ps1
Ps1Ps1
Mnx solutions cybersecurity presentation monroe mi
Mnx solutions cybersecurity presentation monroe miMnx solutions cybersecurity presentation monroe mi
Mnx solutions cybersecurity presentation monroe mi
nwilkens
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
Md. Sarowar Alam Saidi
 
Cyber security
Cyber securityCyber security
Cyber security
Rahul Dey
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
Cristian Garcia G.
 

What's hot (20)

Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
My presentation
My presentationMy presentation
My presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Hacking
HackingHacking
Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Ps1
Ps1Ps1
Ps1
 
Mnx solutions cybersecurity presentation monroe mi
Mnx solutions cybersecurity presentation monroe miMnx solutions cybersecurity presentation monroe mi
Mnx solutions cybersecurity presentation monroe mi
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 

Viewers also liked

PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
Kashif Sohail
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
Kashif Sohail
 
Tumo - From Startup to Business by Haig Kayserian
Tumo - From Startup to Business by Haig KayserianTumo - From Startup to Business by Haig Kayserian
Tumo - From Startup to Business by Haig Kayserian
haigkayserian
 
Updates On Speedy Systems In breakfast
Updates On Speedy Systems In breakfastUpdates On Speedy Systems In breakfast
Updates On Speedy Systems In breakfast
highfalutinpari50
 
Preventing Problems before They Happen with Customized Language Packs (2012)
Preventing Problems before They Happen with Customized Language Packs (2012)Preventing Problems before They Happen with Customized Language Packs (2012)
Preventing Problems before They Happen with Customized Language Packs (2012)
Scott Dinho
 
How to Integrate Course Design and Support without Really Trying (2007)
How to Integrate Course Design and Support without Really Trying (2007)How to Integrate Course Design and Support without Really Trying (2007)
How to Integrate Course Design and Support without Really Trying (2007)
Scott Dinho
 
Innovación a Través de Datos
Innovación a Través de DatosInnovación a Través de Datos
Innovación a Través de Datos
Jose Arturo Mora Soto
 
How the Distribution of New Faculty Training Can Affect Participation and Eng...
How the Distribution of New Faculty Training Can Affect Participation and Eng...How the Distribution of New Faculty Training Can Affect Participation and Eng...
How the Distribution of New Faculty Training Can Affect Participation and Eng...
Scott Dinho
 
Portrait Soumia Difi, chef de projet patrimoine 3F
Portrait Soumia Difi, chef de projet patrimoine 3FPortrait Soumia Difi, chef de projet patrimoine 3F
Portrait Soumia Difi, chef de projet patrimoine 3F
Sylvain Barbaud
 
Portrait Loriane Valtier, cheffe de projet construction neuve
Portrait Loriane Valtier, cheffe de projet construction neuve Portrait Loriane Valtier, cheffe de projet construction neuve
Portrait Loriane Valtier, cheffe de projet construction neuve
Sylvain Barbaud
 
Deliver Digital Change @ Pace
Deliver Digital Change @ PaceDeliver Digital Change @ Pace
Deliver Digital Change @ Pace
Hamish Carr
 
Portrait Gabriel Sautier, chef de projet développement durable
Portrait Gabriel Sautier, chef de projet développement durablePortrait Gabriel Sautier, chef de projet développement durable
Portrait Gabriel Sautier, chef de projet développement durable
Sylvain Barbaud
 

Viewers also liked (13)

PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Lecture 3 Dl.ppt
Lecture 3 Dl.pptLecture 3 Dl.ppt
Lecture 3 Dl.ppt
 
Tumo - From Startup to Business by Haig Kayserian
Tumo - From Startup to Business by Haig KayserianTumo - From Startup to Business by Haig Kayserian
Tumo - From Startup to Business by Haig Kayserian
 
Updates On Speedy Systems In breakfast
Updates On Speedy Systems In breakfastUpdates On Speedy Systems In breakfast
Updates On Speedy Systems In breakfast
 
Preventing Problems before They Happen with Customized Language Packs (2012)
Preventing Problems before They Happen with Customized Language Packs (2012)Preventing Problems before They Happen with Customized Language Packs (2012)
Preventing Problems before They Happen with Customized Language Packs (2012)
 
How to Integrate Course Design and Support without Really Trying (2007)
How to Integrate Course Design and Support without Really Trying (2007)How to Integrate Course Design and Support without Really Trying (2007)
How to Integrate Course Design and Support without Really Trying (2007)
 
Innovación a Través de Datos
Innovación a Través de DatosInnovación a Través de Datos
Innovación a Través de Datos
 
How the Distribution of New Faculty Training Can Affect Participation and Eng...
How the Distribution of New Faculty Training Can Affect Participation and Eng...How the Distribution of New Faculty Training Can Affect Participation and Eng...
How the Distribution of New Faculty Training Can Affect Participation and Eng...
 
Portrait Soumia Difi, chef de projet patrimoine 3F
Portrait Soumia Difi, chef de projet patrimoine 3FPortrait Soumia Difi, chef de projet patrimoine 3F
Portrait Soumia Difi, chef de projet patrimoine 3F
 
Portrait Loriane Valtier, cheffe de projet construction neuve
Portrait Loriane Valtier, cheffe de projet construction neuve Portrait Loriane Valtier, cheffe de projet construction neuve
Portrait Loriane Valtier, cheffe de projet construction neuve
 
Deliver Digital Change @ Pace
Deliver Digital Change @ PaceDeliver Digital Change @ Pace
Deliver Digital Change @ Pace
 
Portrait Gabriel Sautier, chef de projet développement durable
Portrait Gabriel Sautier, chef de projet développement durablePortrait Gabriel Sautier, chef de projet développement durable
Portrait Gabriel Sautier, chef de projet développement durable
 

Similar to PPIT Lecture 17

The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
SidakSingh43
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
MuhammadRadwan10
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Abir Rahman
 
CYBERSECURITY
CYBERSECURITYCYBERSECURITY
CYBERSECURITY
KeshavGarg153749
 
Hacking
HackingHacking
Hacking
NishaPariyar
 
Hacking
HackingHacking
Hacking
mubeenm50
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Seminar
SeminarSeminar
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
PsychoticBanda
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 

Similar to PPIT Lecture 17 (20)

The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBERSECURITY
CYBERSECURITYCYBERSECURITY
CYBERSECURITY
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Hacking
HackingHacking
Hacking
 
Seminar
SeminarSeminar
Seminar
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

More from Kashif Sohail

PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
Kashif Sohail
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
Kashif Sohail
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
Kashif Sohail
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
Kashif Sohail
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
Kashif Sohail
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
Kashif Sohail
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
Kashif Sohail
 
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Kashif Sohail
 

More from Kashif Sohail (9)

PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
 

Recently uploaded

Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 

Recently uploaded (20)

Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 

PPIT Lecture 17

  • 2. WHAT IS NETWORK SECURITY? • Security is much larger than just packets, firewalls, and hackers. Security includes: – Policies and procedures – Liabilities and laws – Human behavior patterns – Corporate security programs and implementation – Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks • Understanding hacking tools and how attacks are carried out is only one piece of the puzzle. 2
  • 3. Hacking  THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING
  • 4. HISTORY OF HACKING 1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING. 1969 – DEVELOPMENT IN THE FIELD OF HACKING. 1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED. 1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
  • 5. WHO IS HACKER?  HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO USES HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA  HE KNOWS ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
  • 6. WHO IS CRACKER?  PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER  CRACKER IS CYBER CRIMINAL  THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
  • 7. WHY DO CRACKERS EXIST?  CRACKERS EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREATE  THEY ARE USED FOR DIFFERENT PURPOSES LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLING THE COMPITITOR COMPANY, FOR CRACKING CREDIT CARD NUMBER
  • 8. DIFFERENCE BETWEEN HACKER & CRACKER  HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKERS CREATE PROGRAM IT AUTOMATICALLY CHECKS REMOTE MACHINE SECURITY STRUCTURE  THEY ALWAYS DO CONTRUCTIVE WORK  CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS  CRACKERS CREATES NOTHING & DESTROY MUCH
  • 9. WHICH OPERATING SYSTEM HACKER USE SUN UNIX MICROSOFT
  • 10. SUN HACKERS Use EITHER SOLARIC X86 OR SCO AS A PLATFORM. THIS IS BECAUSE THESE PRODUCTS ARE LICENSED WARE & THEY CAN EASILY BE OBTAINED.
  • 11. UNIX POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD. WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE. THIS IS REASONABLE.
  • 12. MICROSOFT THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE. IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.