SlideShare a Scribd company logo
8
Most read
10
Most read
12
Most read
Memona Hayder
F24-BSCS-1070
Sir Inam Ul Haq
Department of Computer Science
Faculty of Computer Science
COMPUTER SECURITY(HACKING & CRACKING)
Computer Security(Hacking & Cracking)
Computer security means keeping computers safe and networks from people who should not
access or harm them . It protects data systems from being stolen , damaged or changed.
Types of computer security
1. Network Security
Keeps your internet and wi-fi safe from hackers.
2. Application Security
Keeps software and apps free from bugs and threats.
3.Information Security
Protects your personal and private data.
Continue
4. Operational Security
Controls who can see or use your systems.
5. Disaster Recovery
Helps restore data after problems like crashes or cyber
attack.
Why is computer security Important?
Protecting sensitive information
Preventing from cyber attacks
It ensures business continuity
Hacking
Hacking is the gaining of access to a computer and viewing ,copying or creating data without
the intention of destroying data or maliciously harming the computer.
Types of Hackers
White Hat-Good hackers(ethical)
Black Hat-Bad hackers(illegal)
Grey Hat-in between(may help but without permission)
Role Of Ethical Hackers
Test for system weakness
Help fix security
Protect companies and users
Common Hacking Methods
Malware(viruses , spyware)
Phishing(fake emails)
Password cracking
Exploiting software bug
Cracking
Cracking is the process of gaining unauthorized access with the intension of causing damage.
Crackers are also referred as “Black Hat” hackers.
Cracking Tools
John the Ripper : Password cracking.
Keygens : Fake serial number generators.
Reverse Engineering : Disassembling software to bypass protection.
Software cracking : Common in privacy , violates licensing laws.
Objectives of Hacking
Gaining access to the system by authorized or unauthorized means.
Hackers won’t cause damage to the system.
They just copy or access data
Objectives of Cracking
Gaining access to the system by unauthorized means.
Breaks the security system.
Steal data by damaging the system.
Crackers breaks the system by malicious way introducing a virus into a system.
How To Be Safe?
Firewalls
Protecting networks from unauthorized access.
Antivirus software
Detects and removes viruses , spyware, and malware.
Encrypt Your data
Convert files into secrete code.
Continue
Strong Passwords
Use a mix of letters , numbers and symbols.
Changes passwords regularly.
Data Backups
Ensuring that data can be recovered in case of any loss.
Phishing Protection
Don’t click on links
Fake emails can steal your info or install malware.
Continue
Limit people
Only allow trusted people to access
your computer or network.
Use Secure Wi-Fi
Set strong Wi-Fi passwords.
Avoid using public Wi-Fi for
sensitive tasks.
Conclusion
Hacking and cracking can be
done for good and bad.
Ethical use of hacking skills is
critical for cybersecurity.
Always stay informed , secure
and legal.

More Related Content

PPTX
Internet and personal privacy
PPTX
SECURING INFORMATION SYSTEM 1.pptx
PPTX
Hacking Presentation v2 By Raffi
PPTX
PDF
Information cyber security
PDF
Information & cyber security, Winter training ,bsnl. online
DOCX
Cyber crime
PPTX
HACKING presentation by Team Shivam.pptx
Internet and personal privacy
SECURING INFORMATION SYSTEM 1.pptx
Hacking Presentation v2 By Raffi
Information cyber security
Information & cyber security, Winter training ,bsnl. online
Cyber crime
HACKING presentation by Team Shivam.pptx

Similar to Computer Security(Hacking & Cracking) .pptx (20)

PPTX
CYBER SECURITY
PPTX
What is cyber security
PPTX
Ethical hacking ppt
PPTX
Crackers and Type of Crackers Vs Hackers.pptx
PPTX
Cyber Security
PDF
Sec0001 .pdf
PPTX
iIIBF Cyber Security Presentation 2.pptx
PPTX
Cyber security
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Introduction To Computer Security
PPT
Ethical Hacking - Introduction to Computer Security
PDF
cybersecurity-180303131014.pdf
PPT
Cyber security & Importance of Cyber Security
PPTX
Hacking
PDF
What-is-Hacking and why is it important what are it’s benefits
PDF
IRJET- An Overview of Ethical Hacking
PPSX
Information Security and Ethical Hacking
PPTX
SEMINAR ON CYBER SECURITY.pptx
PDF
Ethical hacking and social engineering
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
CYBER SECURITY
What is cyber security
Ethical hacking ppt
Crackers and Type of Crackers Vs Hackers.pptx
Cyber Security
Sec0001 .pdf
iIIBF Cyber Security Presentation 2.pptx
Cyber security
Ethical Hacking - Introduction to Computer Security
Introduction To Computer Security
Ethical Hacking - Introduction to Computer Security
cybersecurity-180303131014.pdf
Cyber security & Importance of Cyber Security
Hacking
What-is-Hacking and why is it important what are it’s benefits
IRJET- An Overview of Ethical Hacking
Information Security and Ethical Hacking
SEMINAR ON CYBER SECURITY.pptx
Ethical hacking and social engineering
UNIT - I in Engineering Subjects Ethical Hacking Subject

Recently uploaded (20)

PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Lesson notes of climatology university.
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
advance database management system book.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
1_English_Language_Set_2.pdf probationary
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
IGGE1 Understanding the Self1234567891011
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Lesson notes of climatology university.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
advance database management system book.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
A systematic review of self-coping strategies used by university students to ...
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Unit 4 Skeletal System.ppt.pptxopresentatiom
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
1_English_Language_Set_2.pdf probationary
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx

Computer Security(Hacking & Cracking) .pptx

  • 1. Memona Hayder F24-BSCS-1070 Sir Inam Ul Haq Department of Computer Science Faculty of Computer Science COMPUTER SECURITY(HACKING & CRACKING)
  • 2. Computer Security(Hacking & Cracking) Computer security means keeping computers safe and networks from people who should not access or harm them . It protects data systems from being stolen , damaged or changed. Types of computer security 1. Network Security Keeps your internet and wi-fi safe from hackers. 2. Application Security Keeps software and apps free from bugs and threats. 3.Information Security Protects your personal and private data.
  • 3. Continue 4. Operational Security Controls who can see or use your systems. 5. Disaster Recovery Helps restore data after problems like crashes or cyber attack.
  • 4. Why is computer security Important? Protecting sensitive information Preventing from cyber attacks It ensures business continuity
  • 5. Hacking Hacking is the gaining of access to a computer and viewing ,copying or creating data without the intention of destroying data or maliciously harming the computer. Types of Hackers White Hat-Good hackers(ethical) Black Hat-Bad hackers(illegal) Grey Hat-in between(may help but without permission)
  • 6. Role Of Ethical Hackers Test for system weakness Help fix security Protect companies and users
  • 7. Common Hacking Methods Malware(viruses , spyware) Phishing(fake emails) Password cracking Exploiting software bug
  • 8. Cracking Cracking is the process of gaining unauthorized access with the intension of causing damage. Crackers are also referred as “Black Hat” hackers. Cracking Tools John the Ripper : Password cracking. Keygens : Fake serial number generators. Reverse Engineering : Disassembling software to bypass protection. Software cracking : Common in privacy , violates licensing laws.
  • 9. Objectives of Hacking Gaining access to the system by authorized or unauthorized means. Hackers won’t cause damage to the system. They just copy or access data Objectives of Cracking Gaining access to the system by unauthorized means. Breaks the security system. Steal data by damaging the system. Crackers breaks the system by malicious way introducing a virus into a system.
  • 10. How To Be Safe? Firewalls Protecting networks from unauthorized access. Antivirus software Detects and removes viruses , spyware, and malware. Encrypt Your data Convert files into secrete code.
  • 11. Continue Strong Passwords Use a mix of letters , numbers and symbols. Changes passwords regularly. Data Backups Ensuring that data can be recovered in case of any loss. Phishing Protection Don’t click on links Fake emails can steal your info or install malware.
  • 12. Continue Limit people Only allow trusted people to access your computer or network. Use Secure Wi-Fi Set strong Wi-Fi passwords. Avoid using public Wi-Fi for sensitive tasks.
  • 13. Conclusion Hacking and cracking can be done for good and bad. Ethical use of hacking skills is critical for cybersecurity. Always stay informed , secure and legal.