2. Computer Security(Hacking & Cracking)
Computer security means keeping computers safe and networks from people who should not
access or harm them . It protects data systems from being stolen , damaged or changed.
Types of computer security
1. Network Security
Keeps your internet and wi-fi safe from hackers.
2. Application Security
Keeps software and apps free from bugs and threats.
3.Information Security
Protects your personal and private data.
4. Why is computer security Important?
Protecting sensitive information
Preventing from cyber attacks
It ensures business continuity
5. Hacking
Hacking is the gaining of access to a computer and viewing ,copying or creating data without
the intention of destroying data or maliciously harming the computer.
Types of Hackers
White Hat-Good hackers(ethical)
Black Hat-Bad hackers(illegal)
Grey Hat-in between(may help but without permission)
6. Role Of Ethical Hackers
Test for system weakness
Help fix security
Protect companies and users
8. Cracking
Cracking is the process of gaining unauthorized access with the intension of causing damage.
Crackers are also referred as “Black Hat” hackers.
Cracking Tools
John the Ripper : Password cracking.
Keygens : Fake serial number generators.
Reverse Engineering : Disassembling software to bypass protection.
Software cracking : Common in privacy , violates licensing laws.
9. Objectives of Hacking
Gaining access to the system by authorized or unauthorized means.
Hackers won’t cause damage to the system.
They just copy or access data
Objectives of Cracking
Gaining access to the system by unauthorized means.
Breaks the security system.
Steal data by damaging the system.
Crackers breaks the system by malicious way introducing a virus into a system.
10. How To Be Safe?
Firewalls
Protecting networks from unauthorized access.
Antivirus software
Detects and removes viruses , spyware, and malware.
Encrypt Your data
Convert files into secrete code.
11. Continue
Strong Passwords
Use a mix of letters , numbers and symbols.
Changes passwords regularly.
Data Backups
Ensuring that data can be recovered in case of any loss.
Phishing Protection
Don’t click on links
Fake emails can steal your info or install malware.
12. Continue
Limit people
Only allow trusted people to access
your computer or network.
Use Secure Wi-Fi
Set strong Wi-Fi passwords.
Avoid using public Wi-Fi for
sensitive tasks.
13. Conclusion
Hacking and cracking can be
done for good and bad.
Ethical use of hacking skills is
critical for cybersecurity.
Always stay informed , secure
and legal.