SlideShare a Scribd company logo
1 of 10
𝓒𝓸𝓶𝓹𝓾𝓽𝓮𝓻 𝓔𝓽𝓱𝓲𝓬𝓼 :
HACKI
NG
AAKANKSHA SAKHARE 9J 24
HACKING
◼ hacking is the process of gaining unauthorized access into a
computer system, or group of computer systems. hacking is
identifying and exploiting weaknesses in computer systems and/or
computer networks.
◼ practice of modifying or altering computer software and hardware
to accomplish a goal that is considered to be outside of the
creator’s original objective.
◼ unlike the majority of computer crimes which are regarded as
clear cut in terms of legality issues, computer hacking is somewhat
ambiguous.
◼ those individuals who engage in computer hacking activities are
typically referred to as “hackers”.
HACKER
◼ a malicious meddler who attempts to discover and
subsequently tamper with sensitive information through
poking around computer-based technologies. the majority of
hackers possess an advanced understanding of computer
technology.
◼ will possess an expert level in a particular computer program
and have advanced abilities in regards to computer
programming.
◼ there are also hackers who use same skills for good. such
hackers are called white hat hackers.
2.Releasing Viruses To Corrupt Files
EXAMPLES FOR HACKING
REASONS OF HACKING
4. thrill and excitement
◼ people think that it is exciting to be a part of
world of computer crimes.
◼ december 27 1994:
◼ after experiencing an ip spoofing attack
by kevin mitnick, computer security
expert started to receive prank calls that
popularized the phrase "my kung fu is
stronger than yours".
5.romanticizing of hacking
6. money
in 2018 hackers stole half a billion personal records
◼ this was a 126% jump from 2017.
◼ since 2013 there are approximately 3,809,448 records
stolen from breaches.
◼ reports cybersecurity ventures.
the average cost of a data breach in 2020 will exceed $150
million
◼ that cybercrime will cost businesses over $2 trillion total in
2019.
◼ suggests juniper research
CONCLUSION
◼ ginni rometty, ibm’s chairman, president and ceo,
said:
◼ “cybercrime is the greatest threat to every company
in the world.” and she was right.
◼ during the next five years, cybercrime might
become the greatest threat to every person, place
and thing in the world.
AAKANKSHA 9J 24

More Related Content

Similar to Computer Ethics - Hacking

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 

Similar to Computer Ethics - Hacking (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
Hacking
HackingHacking
Hacking
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

More from thelilly

PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022
thelilly
 
DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022
thelilly
 
Spectrum: The Beauty of Light
Spectrum: The Beauty of LightSpectrum: The Beauty of Light
Spectrum: The Beauty of Light
thelilly
 

More from thelilly (7)

PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022PLANT GROWTH AND DEVELOPMENT 2022
PLANT GROWTH AND DEVELOPMENT 2022
 
DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022DIGESTION AND ABSORPTION 2022
DIGESTION AND ABSORPTION 2022
 
Spectrum: The Beauty of Light
Spectrum: The Beauty of LightSpectrum: The Beauty of Light
Spectrum: The Beauty of Light
 
Indian Union's Governance System
Indian Union's Governance SystemIndian Union's Governance System
Indian Union's Governance System
 
THE PERIODIC TABLE
THE PERIODIC TABLETHE PERIODIC TABLE
THE PERIODIC TABLE
 
Photosynthesis Presentation Part 2
Photosynthesis Presentation Part 2Photosynthesis Presentation Part 2
Photosynthesis Presentation Part 2
 
Photosynthesis: A Plants Kitchen
Photosynthesis: A Plants KitchenPhotosynthesis: A Plants Kitchen
Photosynthesis: A Plants Kitchen
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Computer Ethics - Hacking

  • 2. HACKING ◼ hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. ◼ practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. ◼ unlike the majority of computer crimes which are regarded as clear cut in terms of legality issues, computer hacking is somewhat ambiguous. ◼ those individuals who engage in computer hacking activities are typically referred to as “hackers”.
  • 3. HACKER ◼ a malicious meddler who attempts to discover and subsequently tamper with sensitive information through poking around computer-based technologies. the majority of hackers possess an advanced understanding of computer technology. ◼ will possess an expert level in a particular computer program and have advanced abilities in regards to computer programming. ◼ there are also hackers who use same skills for good. such hackers are called white hat hackers.
  • 4. 2.Releasing Viruses To Corrupt Files EXAMPLES FOR HACKING
  • 6. 4. thrill and excitement ◼ people think that it is exciting to be a part of world of computer crimes. ◼ december 27 1994: ◼ after experiencing an ip spoofing attack by kevin mitnick, computer security expert started to receive prank calls that popularized the phrase "my kung fu is stronger than yours".
  • 8. 6. money in 2018 hackers stole half a billion personal records ◼ this was a 126% jump from 2017. ◼ since 2013 there are approximately 3,809,448 records stolen from breaches. ◼ reports cybersecurity ventures. the average cost of a data breach in 2020 will exceed $150 million ◼ that cybercrime will cost businesses over $2 trillion total in 2019. ◼ suggests juniper research
  • 9. CONCLUSION ◼ ginni rometty, ibm’s chairman, president and ceo, said: ◼ “cybercrime is the greatest threat to every company in the world.” and she was right. ◼ during the next five years, cybercrime might become the greatest threat to every person, place and thing in the world.