SlideShare a Scribd company logo
Hacker
Who is a HACKER?
A hacker is a person who has a
complete knowledge of a computer
system.
Hacker
Differences between a hacker and
cracker
Hacker

Cracker

Referred as White hat

Referred as Black hat

Hired by companies

Work for themselves

Aims to fix flaws

Breaks into system
illegally
Where does India lag in terms of cyber
security??

India has around 35,000 cyber security professionals
Whereas
China has 3,50,00,000 cyber security professionals…
CBI site was hacked in
December 2010 by
Pakistan
Cyber Army (PCA).
Hacker
Hosting history of www.cbi.nic.in
Hosting history of www.fbi.gov
Most common hacking techniques
•
•
•
•

Email Spoofing
SQL Injection
Phishing
Key Loggers
E-mail spoofing
• Fooling people by sending fake emails.
• Attatchments can be sent along with
emails containing viruses
• Popular sites
-funmaza.com,deadfake.com,emkei.z
A Good Hacker
* Knows how to program.
* Knows how to use open source UNIX.
* Doesn’t leave any trace behind.
* Knows how to use World Wide Web
and write HTML
Certified Ethical Hacker (CEH)

* Professional certification by EC-Council
* Usually employed for an organization
* Certification achieved by clearing exam
* Exam Code 312-50, 125 MCQ questions,4 hours exam
India’s Hacking genius -Ankit
Fadia







Hacked first website at age of 14
Wrote “Unofficial Guide to Ethical Hacking” at age of 15
Featured in MTV show “MTV What the Hack” in
October,2009.
Gave tips about how to make good use of internet
India’s youth icon of the year 2008
Ambassador for Cyber Security by Indian Govt. in 2011
Information Technology Act





Act of Indian Parliament
Passed on October 17,2000
94 sections segregated into 13 chapters
Strict actions against cyber crimes
Better be a

than being
a
Bibliography
► www.google.com
► www.wikipedia.org
► www.netcraft.com
Thank You
Name-Nikhil Khurana
Roll No -101303108
st
COE-4 (1 Year)
Thapar University,Patiala

More Related Content

PPTX
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Hacking
PPT
PPTX
Hacking
PPTX
Computer hacking
PPTX
Computer Hacking - An Introduction
PPTX
hacking presentation slide
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking
Hacking
Computer hacking
Computer Hacking - An Introduction
hacking presentation slide

What's hot (19)

PPTX
Hacking
PDF
Cyber crime in Pakistan
PPT
Hacking presentation
PPTX
PPTX
Hacking Presentation v2 By Raffi
PPTX
HACKING
PPTX
Hacking
PDF
Impact of cybercrime
PPTX
How to hack or what is ethical hacking
PPTX
Internet and personal privacy
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPT
Introduction to ethical hacking
PPT
Hackers
KEY
Computer crime hacking
PPTX
Ethical Hacking
PPTX
Hacking presentation
PPTX
Ict lec#9
PPTX
Cyber crime introduction awareness program at st. xavier
PPT
Cyber Crime
Hacking
Cyber crime in Pakistan
Hacking presentation
Hacking Presentation v2 By Raffi
HACKING
Hacking
Impact of cybercrime
How to hack or what is ethical hacking
Internet and personal privacy
Basic of Ethical Hacking and Penetration Testing - 1st Module
Introduction to ethical hacking
Hackers
Computer crime hacking
Ethical Hacking
Hacking presentation
Ict lec#9
Cyber crime introduction awareness program at st. xavier
Cyber Crime

Similar to Hacker (20)

PPTX
1861229635078720084665000 131012131913-phpapp02
PPTX
ethical hacking in the modern times
PPTX
Arya
PPT
CO1-Concept of ethical hacking Explained
PPTX
Ethical hacking
PPT
Ethical hacking
PPT
Ethical hacking
PPTX
Ethical hacking
DOCX
Application of computer to legal practice (hacking)
PPTX
National information security education & awareness program
PPTX
Hacking
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
Ethical Hacking
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPT
Course on Ehtical Hacking - Introduction
PPTX
Ethical hacking
1861229635078720084665000 131012131913-phpapp02
ethical hacking in the modern times
Arya
CO1-Concept of ethical hacking Explained
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Application of computer to legal practice (hacking)
National information security education & awareness program
Hacking
UNIT - I in Engineering Subjects Ethical Hacking Subject
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Ethical Hacking
ethicalhacking1 final.pdf
Ethical hacking Presentation
Course on Ehtical Hacking - Introduction
Ethical hacking

Recently uploaded (20)

PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Empowerment Technology for Senior High School Guide
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Complications of Minimal Access Surgery at WLH
PDF
Classroom Observation Tools for Teachers
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Chinmaya Tiranga quiz Grand Finale.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Empowerment Technology for Senior High School Guide
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Final Presentation General Medicine 03-08-2024.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Complications of Minimal Access Surgery at WLH
Classroom Observation Tools for Teachers
Digestion and Absorption of Carbohydrates, Proteina and Fats
Cell Types and Its function , kingdom of life
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
A powerpoint presentation on the Revised K-10 Science Shaping Paper
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...

Hacker

  • 2. Who is a HACKER? A hacker is a person who has a complete knowledge of a computer system.
  • 4. Differences between a hacker and cracker Hacker Cracker Referred as White hat Referred as Black hat Hired by companies Work for themselves Aims to fix flaws Breaks into system illegally
  • 5. Where does India lag in terms of cyber security?? India has around 35,000 cyber security professionals Whereas China has 3,50,00,000 cyber security professionals…
  • 6. CBI site was hacked in December 2010 by Pakistan Cyber Army (PCA).
  • 8. Hosting history of www.cbi.nic.in
  • 9. Hosting history of www.fbi.gov
  • 10. Most common hacking techniques • • • • Email Spoofing SQL Injection Phishing Key Loggers
  • 11. E-mail spoofing • Fooling people by sending fake emails. • Attatchments can be sent along with emails containing viruses • Popular sites -funmaza.com,deadfake.com,emkei.z
  • 12. A Good Hacker * Knows how to program. * Knows how to use open source UNIX. * Doesn’t leave any trace behind. * Knows how to use World Wide Web and write HTML
  • 13. Certified Ethical Hacker (CEH) * Professional certification by EC-Council * Usually employed for an organization * Certification achieved by clearing exam * Exam Code 312-50, 125 MCQ questions,4 hours exam
  • 14. India’s Hacking genius -Ankit Fadia       Hacked first website at age of 14 Wrote “Unofficial Guide to Ethical Hacking” at age of 15 Featured in MTV show “MTV What the Hack” in October,2009. Gave tips about how to make good use of internet India’s youth icon of the year 2008 Ambassador for Cyber Security by Indian Govt. in 2011
  • 15. Information Technology Act     Act of Indian Parliament Passed on October 17,2000 94 sections segregated into 13 chapters Strict actions against cyber crimes
  • 16. Better be a than being a
  • 18. Thank You Name-Nikhil Khurana Roll No -101303108 st COE-4 (1 Year) Thapar University,Patiala

Editor's Notes