SlideShare a Scribd company logo
Visual hacking is used to visually capture private,sensitive information for unauthorized
access.for example we give a visiting pass to a person he can roam anywhere in the offie.person
can snap photo of employee device screen.by this information he can hack the company
databases.
Employees who have access to company databases may either leak the essential data with out
knowing it or employees can be lured by financial gain
social engineering happens when malicious employee try to gain access by asking passwords to
resolve issues.spear pishing is another technique they will sent an email as a friend and ask to
clik below link.
viruses-Attackers can develop harmful code known as viruses. Using hacking techniques, they
can break into systems and plant viruses.
worms. These are programs that run independently and travel from computer to computer across
network connections. Worms may have portions of themselves running on many different
computers. Worms do not change other programs, although they may carry other code that does.
password cracking. This is a technique attackers use to surreptitiously gain system access
through another user's account. This is possible because users often select weak passwords. The
two major problems with passwords is when they are easy to guess based on knowledge of the
user.
E-mail hacking. Electronic mail is one of the most popular features of the Internet. With access
to Internet e-mail, someone can potentially correspond with any one of millions of people
worldwide.
Denial-of-service attacks. They will create the need to have a service available. It is a growing
trend on the Internet because Web sites in general are open doors ready for abuse. People can
easily flood the Web server with communication in order to keep it busy. Therefore, companies
connected to the Internet should prepare for (DoS) attacks. They also are difficult to trace and
allow other types of attacks to be subdued.
Trojan horses. These are malicious programs or software code hidden inside what looks like a
normal program. When a user runs the normal program, the hidden code runs as well. It can then
start deleting files and causing other damage to the computer. Trojan horses are normally spread
by e-mail attachments.
Network spoofing. In network spoofing, a system presents itself to the network as though it were
a different system
intrusion attacks. In these attacks, a hacker uses various hacking tools to gain access to systems.
These can range from password-cracking tools to protocol hacking and manipulation tools.
Solution
Visual hacking is used to visually capture private,sensitive information for unauthorized
access.for example we give a visiting pass to a person he can roam anywhere in the offie.person
can snap photo of employee device screen.by this information he can hack the company
databases.
Employees who have access to company databases may either leak the essential data with out
knowing it or employees can be lured by financial gain
social engineering happens when malicious employee try to gain access by asking passwords to
resolve issues.spear pishing is another technique they will sent an email as a friend and ask to
clik below link.
viruses-Attackers can develop harmful code known as viruses. Using hacking techniques, they
can break into systems and plant viruses.
worms. These are programs that run independently and travel from computer to computer across
network connections. Worms may have portions of themselves running on many different
computers. Worms do not change other programs, although they may carry other code that does.
password cracking. This is a technique attackers use to surreptitiously gain system access
through another user's account. This is possible because users often select weak passwords. The
two major problems with passwords is when they are easy to guess based on knowledge of the
user.
E-mail hacking. Electronic mail is one of the most popular features of the Internet. With access
to Internet e-mail, someone can potentially correspond with any one of millions of people
worldwide.
Denial-of-service attacks. They will create the need to have a service available. It is a growing
trend on the Internet because Web sites in general are open doors ready for abuse. People can
easily flood the Web server with communication in order to keep it busy. Therefore, companies
connected to the Internet should prepare for (DoS) attacks. They also are difficult to trace and
allow other types of attacks to be subdued.
Trojan horses. These are malicious programs or software code hidden inside what looks like a
normal program. When a user runs the normal program, the hidden code runs as well. It can then
start deleting files and causing other damage to the computer. Trojan horses are normally spread
by e-mail attachments.
Network spoofing. In network spoofing, a system presents itself to the network as though it were
a different system
intrusion attacks. In these attacks, a hacker uses various hacking tools to gain access to systems.
These can range from password-cracking tools to protocol hacking and manipulation tools.

More Related Content

Similar to Visual hacking is used to visually capture private,sensitive informa.pdf

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
Klaus Drosch
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
SarahReese14
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Network security
Network securityNetwork security
Network security
Md. Asifur Rahman Siddiki
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
Kudzai Rerayi
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Debabrata Singh
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
ajajkhan16
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
Stephanie Williams
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
AariyaRathi
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
Ajay Jassi
 

Similar to Visual hacking is used to visually capture private,sensitive informa.pdf (20)

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Network security
Network securityNetwork security
Network security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Computer security
Computer securityComputer security
Computer security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 

More from anandshingavi23

You need to provide the data for the 4 other meas.pdf
                     You need to provide the data for the 4 other meas.pdf                     You need to provide the data for the 4 other meas.pdf
You need to provide the data for the 4 other meas.pdf
anandshingavi23
 
When an acid reacts with a base produces a salt &.pdf
                     When an acid reacts with a base produces a salt &.pdf                     When an acid reacts with a base produces a salt &.pdf
When an acid reacts with a base produces a salt &.pdf
anandshingavi23
 
The one with the lowest Ksp will precipitate firs.pdf
                     The one with the lowest Ksp will precipitate firs.pdf                     The one with the lowest Ksp will precipitate firs.pdf
The one with the lowest Ksp will precipitate firs.pdf
anandshingavi23
 
Riboflavin (Vitamin B2) consists of the sugar alc.pdf
                     Riboflavin (Vitamin B2) consists of the sugar alc.pdf                     Riboflavin (Vitamin B2) consists of the sugar alc.pdf
Riboflavin (Vitamin B2) consists of the sugar alc.pdf
anandshingavi23
 
molar mass, or atomic weight, its true False. .pdf
                     molar mass, or atomic weight, its true    False. .pdf                     molar mass, or atomic weight, its true    False. .pdf
molar mass, or atomic weight, its true False. .pdf
anandshingavi23
 
just multiply 806 by the molar mass of water and .pdf
                     just multiply 806 by the molar mass of water and .pdf                     just multiply 806 by the molar mass of water and .pdf
just multiply 806 by the molar mass of water and .pdf
anandshingavi23
 
Image is not visible, kindly repost. .pdf
                     Image is not visible, kindly repost.             .pdf                     Image is not visible, kindly repost.             .pdf
Image is not visible, kindly repost. .pdf
anandshingavi23
 
When it comes categorizing hazardous waste, the EPA has broken it do.pdf
When it comes categorizing hazardous waste, the EPA has broken it do.pdfWhen it comes categorizing hazardous waste, the EPA has broken it do.pdf
When it comes categorizing hazardous waste, the EPA has broken it do.pdf
anandshingavi23
 
The standards used for the various layers in an Ethernet-based netwo.pdf
The standards used for the various layers in an Ethernet-based netwo.pdfThe standards used for the various layers in an Ethernet-based netwo.pdf
The standards used for the various layers in an Ethernet-based netwo.pdf
anandshingavi23
 
The probability of at least one goal is P(X 1) = 1SolutionTh.pdf
The probability of at least one goal is P(X  1) = 1SolutionTh.pdfThe probability of at least one goal is P(X  1) = 1SolutionTh.pdf
The probability of at least one goal is P(X 1) = 1SolutionTh.pdf
anandshingavi23
 
The end result of double fertilization is zygote and edosperm. In th.pdf
The end result of double fertilization is zygote and edosperm. In th.pdfThe end result of double fertilization is zygote and edosperm. In th.pdf
The end result of double fertilization is zygote and edosperm. In th.pdf
anandshingavi23
 
The conus medullaris (Latin for medullary cone) is the tapered, .pdf
The conus medullaris (Latin for medullary cone) is the tapered, .pdfThe conus medullaris (Latin for medullary cone) is the tapered, .pdf
The conus medullaris (Latin for medullary cone) is the tapered, .pdf
anandshingavi23
 
D is the answer take care .pdf
                     D is the answer  take care                       .pdf                     D is the answer  take care                       .pdf
D is the answer take care .pdf
anandshingavi23
 
Endothermic or exothermic reaction nature .pdf
                     Endothermic or exothermic reaction nature        .pdf                     Endothermic or exothermic reaction nature        .pdf
Endothermic or exothermic reaction nature .pdf
anandshingavi23
 
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdf
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdfStep1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdf
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdf
anandshingavi23
 
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdf
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdfSolution66. Candida albicans is vaginal Yeast infection or “Thrus.pdf
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdf
anandshingavi23
 
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdf
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdfRate of formation of P2O5=rate of reaction Rate of formation =2.9.pdf
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdf
anandshingavi23
 
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdf
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdfSolution Lymphoid stem cell is a type of blood stem cells.These s.pdf
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdf
anandshingavi23
 
copper sulphate when added to 5 moles of water ge.pdf
                     copper sulphate when added to 5 moles of water ge.pdf                     copper sulphate when added to 5 moles of water ge.pdf
copper sulphate when added to 5 moles of water ge.pdf
anandshingavi23
 
public class Point {   Insert your name here    private dou.pdf
public class Point {    Insert your name here    private dou.pdfpublic class Point {    Insert your name here    private dou.pdf
public class Point {   Insert your name here    private dou.pdf
anandshingavi23
 

More from anandshingavi23 (20)

You need to provide the data for the 4 other meas.pdf
                     You need to provide the data for the 4 other meas.pdf                     You need to provide the data for the 4 other meas.pdf
You need to provide the data for the 4 other meas.pdf
 
When an acid reacts with a base produces a salt &.pdf
                     When an acid reacts with a base produces a salt &.pdf                     When an acid reacts with a base produces a salt &.pdf
When an acid reacts with a base produces a salt &.pdf
 
The one with the lowest Ksp will precipitate firs.pdf
                     The one with the lowest Ksp will precipitate firs.pdf                     The one with the lowest Ksp will precipitate firs.pdf
The one with the lowest Ksp will precipitate firs.pdf
 
Riboflavin (Vitamin B2) consists of the sugar alc.pdf
                     Riboflavin (Vitamin B2) consists of the sugar alc.pdf                     Riboflavin (Vitamin B2) consists of the sugar alc.pdf
Riboflavin (Vitamin B2) consists of the sugar alc.pdf
 
molar mass, or atomic weight, its true False. .pdf
                     molar mass, or atomic weight, its true    False. .pdf                     molar mass, or atomic weight, its true    False. .pdf
molar mass, or atomic weight, its true False. .pdf
 
just multiply 806 by the molar mass of water and .pdf
                     just multiply 806 by the molar mass of water and .pdf                     just multiply 806 by the molar mass of water and .pdf
just multiply 806 by the molar mass of water and .pdf
 
Image is not visible, kindly repost. .pdf
                     Image is not visible, kindly repost.             .pdf                     Image is not visible, kindly repost.             .pdf
Image is not visible, kindly repost. .pdf
 
When it comes categorizing hazardous waste, the EPA has broken it do.pdf
When it comes categorizing hazardous waste, the EPA has broken it do.pdfWhen it comes categorizing hazardous waste, the EPA has broken it do.pdf
When it comes categorizing hazardous waste, the EPA has broken it do.pdf
 
The standards used for the various layers in an Ethernet-based netwo.pdf
The standards used for the various layers in an Ethernet-based netwo.pdfThe standards used for the various layers in an Ethernet-based netwo.pdf
The standards used for the various layers in an Ethernet-based netwo.pdf
 
The probability of at least one goal is P(X 1) = 1SolutionTh.pdf
The probability of at least one goal is P(X  1) = 1SolutionTh.pdfThe probability of at least one goal is P(X  1) = 1SolutionTh.pdf
The probability of at least one goal is P(X 1) = 1SolutionTh.pdf
 
The end result of double fertilization is zygote and edosperm. In th.pdf
The end result of double fertilization is zygote and edosperm. In th.pdfThe end result of double fertilization is zygote and edosperm. In th.pdf
The end result of double fertilization is zygote and edosperm. In th.pdf
 
The conus medullaris (Latin for medullary cone) is the tapered, .pdf
The conus medullaris (Latin for medullary cone) is the tapered, .pdfThe conus medullaris (Latin for medullary cone) is the tapered, .pdf
The conus medullaris (Latin for medullary cone) is the tapered, .pdf
 
D is the answer take care .pdf
                     D is the answer  take care                       .pdf                     D is the answer  take care                       .pdf
D is the answer take care .pdf
 
Endothermic or exothermic reaction nature .pdf
                     Endothermic or exothermic reaction nature        .pdf                     Endothermic or exothermic reaction nature        .pdf
Endothermic or exothermic reaction nature .pdf
 
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdf
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdfStep1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdf
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdf
 
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdf
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdfSolution66. Candida albicans is vaginal Yeast infection or “Thrus.pdf
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdf
 
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdf
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdfRate of formation of P2O5=rate of reaction Rate of formation =2.9.pdf
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdf
 
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdf
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdfSolution Lymphoid stem cell is a type of blood stem cells.These s.pdf
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdf
 
copper sulphate when added to 5 moles of water ge.pdf
                     copper sulphate when added to 5 moles of water ge.pdf                     copper sulphate when added to 5 moles of water ge.pdf
copper sulphate when added to 5 moles of water ge.pdf
 
public class Point {   Insert your name here    private dou.pdf
public class Point {    Insert your name here    private dou.pdfpublic class Point {    Insert your name here    private dou.pdf
public class Point {   Insert your name here    private dou.pdf
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Visual hacking is used to visually capture private,sensitive informa.pdf

  • 1. Visual hacking is used to visually capture private,sensitive information for unauthorized access.for example we give a visiting pass to a person he can roam anywhere in the offie.person can snap photo of employee device screen.by this information he can hack the company databases. Employees who have access to company databases may either leak the essential data with out knowing it or employees can be lured by financial gain social engineering happens when malicious employee try to gain access by asking passwords to resolve issues.spear pishing is another technique they will sent an email as a friend and ask to clik below link. viruses-Attackers can develop harmful code known as viruses. Using hacking techniques, they can break into systems and plant viruses. worms. These are programs that run independently and travel from computer to computer across network connections. Worms may have portions of themselves running on many different computers. Worms do not change other programs, although they may carry other code that does. password cracking. This is a technique attackers use to surreptitiously gain system access through another user's account. This is possible because users often select weak passwords. The two major problems with passwords is when they are easy to guess based on knowledge of the user. E-mail hacking. Electronic mail is one of the most popular features of the Internet. With access to Internet e-mail, someone can potentially correspond with any one of millions of people worldwide. Denial-of-service attacks. They will create the need to have a service available. It is a growing trend on the Internet because Web sites in general are open doors ready for abuse. People can easily flood the Web server with communication in order to keep it busy. Therefore, companies connected to the Internet should prepare for (DoS) attacks. They also are difficult to trace and allow other types of attacks to be subdued. Trojan horses. These are malicious programs or software code hidden inside what looks like a normal program. When a user runs the normal program, the hidden code runs as well. It can then start deleting files and causing other damage to the computer. Trojan horses are normally spread by e-mail attachments. Network spoofing. In network spoofing, a system presents itself to the network as though it were a different system intrusion attacks. In these attacks, a hacker uses various hacking tools to gain access to systems. These can range from password-cracking tools to protocol hacking and manipulation tools.
  • 2. Solution Visual hacking is used to visually capture private,sensitive information for unauthorized access.for example we give a visiting pass to a person he can roam anywhere in the offie.person can snap photo of employee device screen.by this information he can hack the company databases. Employees who have access to company databases may either leak the essential data with out knowing it or employees can be lured by financial gain social engineering happens when malicious employee try to gain access by asking passwords to resolve issues.spear pishing is another technique they will sent an email as a friend and ask to clik below link. viruses-Attackers can develop harmful code known as viruses. Using hacking techniques, they can break into systems and plant viruses. worms. These are programs that run independently and travel from computer to computer across network connections. Worms may have portions of themselves running on many different computers. Worms do not change other programs, although they may carry other code that does. password cracking. This is a technique attackers use to surreptitiously gain system access through another user's account. This is possible because users often select weak passwords. The two major problems with passwords is when they are easy to guess based on knowledge of the user. E-mail hacking. Electronic mail is one of the most popular features of the Internet. With access to Internet e-mail, someone can potentially correspond with any one of millions of people worldwide. Denial-of-service attacks. They will create the need to have a service available. It is a growing trend on the Internet because Web sites in general are open doors ready for abuse. People can easily flood the Web server with communication in order to keep it busy. Therefore, companies connected to the Internet should prepare for (DoS) attacks. They also are difficult to trace and allow other types of attacks to be subdued. Trojan horses. These are malicious programs or software code hidden inside what looks like a normal program. When a user runs the normal program, the hidden code runs as well. It can then start deleting files and causing other damage to the computer. Trojan horses are normally spread by e-mail attachments. Network spoofing. In network spoofing, a system presents itself to the network as though it were a different system intrusion attacks. In these attacks, a hacker uses various hacking tools to gain access to systems. These can range from password-cracking tools to protocol hacking and manipulation tools.