SlideShare a Scribd company logo
8
Most read
COMPUTER
SECURITY &
ETHICS
Chapter 06
Hacker
Cracker
Cyber Crime
Computer Security is:
1. Protecting computer hardware ,software and
information stored on computer from threats .
Importance of Computer Security :
Computer security or safety Is important for computer
users to protect their computer from different threats .
It is necessary to install security software such as firewall
,antivirus and spyware on computers.
COMPUTER SECURITY
 Any crime that is committed by the means
of computer and internet technology by
having access to others computer .
 Criminals use computer and internet
technology to harm the society .
 Commonly committed crimes :
 Crimes such as fraud ,kidnapping ,murder
and crimes related with stealing money from
bank and credit card company .
 Download illegal software ,music files and
videos are also cybercrimes .
CYBERCRIME
Internet harassment and cyber bullying is also
serious committed crimes by cybercriminals .
• Threatening email
• Spreading rumors or virus
• Defamatory comments or any other form of bad
material( photos, videos)
• All above are the crimes done by cybercriminals
.
COMMONLY COMMITTED CRIMES
Hackers have in-depth knowledge of network programming.and
can create tools and malicious software for others to break into
networks and create problems.
Hackers computer experts try to gain
unauthorized access to computer system for
stealing and corrupting information .
Copy paste the link and watch the you tube video
regarding hacking
https://www.youtube.com/watch?v=9juhDTsmyTI
HACKERS
Cracker is a computer user do not have professional
computer skill to hack computer systems but they
have knowledge about using hacking tools
Crackers break into computers and cause
serious damage .they also break into web
servers and replace the homepage with a
page they have designed on their own . Short
video how key loggers are use
https://searchsecurity.techtarget.com/definiti
on/keylogger
CRACKER
HACKER CRACKER
HACKER
A person who illegally
breaks into
others’ computer
systems is known
as hacker.
Cracker is a computer
user
who breaks into
computer
system without
permission
using hacking tools for
personal gain or
damage.
HACKER AND CRACKER
Solve the following questions :
1.Define Cybercrime ?
2.What is the importance of
computer security ?
3.Differentiate between hacker
and cracker.
4.Write down in detail the
example of hacker and cracker
(1 for each)
ASSIGNMENT
Refer text
book pg.
158-160
HINT

More Related Content

PPTX
Cyber Crime and Ethical Hacking
PPTX
Cyber crime and secuity
RTF
Hacking and its types
PDF
Computer Security
PDF
Computer hacking – Is it Ethical PPT
PPTX
CYBER ETHICS, CRIMES AND SAFTY
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Cyber Crime and Ethical Hacking
Cyber crime and secuity
Hacking and its types
Computer Security
Computer hacking – Is it Ethical PPT
CYBER ETHICS, CRIMES AND SAFTY
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...

What's hot (20)

PPTX
Hacking
ODP
Ethical hacking ppt
PPTX
how to prevent system from hacking...by sarika
PPTX
Introduction to information security
PPTX
Web defacement
PPTX
Attack types
PPTX
HACKING
PPSX
Hacking
PPTX
Computer securety
PPTX
Hacking
PPTX
Hacking & its types
PPT
Hacker
ODP
Introduction To Hacking
PPTX
Hacking and its types
PPTX
PPTX
Hacking
PPTX
Is hacking good or bad
PPTX
Hacking
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacking
Hacking
Ethical hacking ppt
how to prevent system from hacking...by sarika
Introduction to information security
Web defacement
Attack types
HACKING
Hacking
Computer securety
Hacking
Hacking & its types
Hacker
Introduction To Hacking
Hacking and its types
Hacking
Is hacking good or bad
Hacking
Ethical hacking-presentation-updated(1by )Rasheed
Hacking

Similar to Hacker cracker cybercrime-computer security (20)

PPTX
Ethical hacking ppt
PPTX
Presentation1_CYBERCRIME.pptx
PPT
Armand Hacking
PPTX
PPTX
Cyber crime and security
PPTX
Computer-Security.pptx
PPTX
PPTX
Week_7.pptx Computer science topic 7 Notes
PPTX
Computer security & ethics
PDF
Unit14-Computer Security and ethics -downloaded.pdf
PPTX
Cyber crime & law
PPTX
Computer security
PDF
Ethical hacking
PDF
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
DOCX
Cyber crime
PPTX
Computer Security risks Shelly
PPSX
Cyber security & Data Protection
PPTX
Chapter 1
PPTX
Chapter 1
PPTX
Network security
Ethical hacking ppt
Presentation1_CYBERCRIME.pptx
Armand Hacking
Cyber crime and security
Computer-Security.pptx
Week_7.pptx Computer science topic 7 Notes
Computer security & ethics
Unit14-Computer Security and ethics -downloaded.pdf
Cyber crime & law
Computer security
Ethical hacking
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Cyber crime
Computer Security risks Shelly
Cyber security & Data Protection
Chapter 1
Chapter 1
Network security

More from ShouaQureshi (18)

PPTX
touchscreens
PPTX
3D Priinters
PPTX
2D and 3D Cutter
PPTX
scanners touchscreen bar code readers
PPTX
impact and non impact printers
PPTX
Chapter 1
PPTX
2d and 3d cutters
PPTX
Key,ID Field and Tables Relationship
PPTX
Input and output devices
PPTX
Malware part 2
PPTX
Malware part 1
DOCX
Multiple choice questions chapter 1
PPTX
Malware and its types
PPTX
Class ix ms word part 1
PPTX
Word processing part 2 lecture and assignment updated
PPTX
Spreadsheet new
PPTX
Manupulating and formatting data
PPTX
Protect computer from malware
touchscreens
3D Priinters
2D and 3D Cutter
scanners touchscreen bar code readers
impact and non impact printers
Chapter 1
2d and 3d cutters
Key,ID Field and Tables Relationship
Input and output devices
Malware part 2
Malware part 1
Multiple choice questions chapter 1
Malware and its types
Class ix ms word part 1
Word processing part 2 lecture and assignment updated
Spreadsheet new
Manupulating and formatting data
Protect computer from malware

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
1_English_Language_Set_2.pdf probationary
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Cell Types and Its function , kingdom of life
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Computing-Curriculum for Schools in Ghana
Lesson notes of climatology university.
Digestion and Absorption of Carbohydrates, Proteina and Fats
Supply Chain Operations Speaking Notes -ICLT Program
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Unit 4 Skeletal System.ppt.pptxopresentatiom
Indian roads congress 037 - 2012 Flexible pavement
1_English_Language_Set_2.pdf probationary
Weekly quiz Compilation Jan -July 25.pdf
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
History, Philosophy and sociology of education (1).pptx
IGGE1 Understanding the Self1234567891011
Cell Types and Its function , kingdom of life
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Paper A Mock Exam 9_ Attempt review.pdf.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Computing-Curriculum for Schools in Ghana

Hacker cracker cybercrime-computer security

  • 2. Computer Security is: 1. Protecting computer hardware ,software and information stored on computer from threats . Importance of Computer Security : Computer security or safety Is important for computer users to protect their computer from different threats . It is necessary to install security software such as firewall ,antivirus and spyware on computers. COMPUTER SECURITY
  • 3.  Any crime that is committed by the means of computer and internet technology by having access to others computer .  Criminals use computer and internet technology to harm the society .  Commonly committed crimes :  Crimes such as fraud ,kidnapping ,murder and crimes related with stealing money from bank and credit card company .  Download illegal software ,music files and videos are also cybercrimes . CYBERCRIME
  • 4. Internet harassment and cyber bullying is also serious committed crimes by cybercriminals . • Threatening email • Spreading rumors or virus • Defamatory comments or any other form of bad material( photos, videos) • All above are the crimes done by cybercriminals . COMMONLY COMMITTED CRIMES
  • 5. Hackers have in-depth knowledge of network programming.and can create tools and malicious software for others to break into networks and create problems. Hackers computer experts try to gain unauthorized access to computer system for stealing and corrupting information . Copy paste the link and watch the you tube video regarding hacking https://www.youtube.com/watch?v=9juhDTsmyTI HACKERS
  • 6. Cracker is a computer user do not have professional computer skill to hack computer systems but they have knowledge about using hacking tools Crackers break into computers and cause serious damage .they also break into web servers and replace the homepage with a page they have designed on their own . Short video how key loggers are use https://searchsecurity.techtarget.com/definiti on/keylogger CRACKER
  • 7. HACKER CRACKER HACKER A person who illegally breaks into others’ computer systems is known as hacker. Cracker is a computer user who breaks into computer system without permission using hacking tools for personal gain or damage. HACKER AND CRACKER
  • 8. Solve the following questions : 1.Define Cybercrime ? 2.What is the importance of computer security ? 3.Differentiate between hacker and cracker. 4.Write down in detail the example of hacker and cracker (1 for each) ASSIGNMENT Refer text book pg. 158-160 HINT