SlideShare a Scribd company logo
ASSIGNMENT
Anushamol R A
Roll no.28
Physical science
HACKING
History of Hacking
❖ Hacking has been a part of computing for 40 years.
❖ The first computer hacker emerged at MIT .
❖ Hacking is began in the 1960 at MIT, origin of the term
‘hacker’.
❖ The truth hacker amongst our societies have thirst for the
knowledge .
❖ Boredom is never an object of challenge for the hacker .
What is Hacking ?
The process of attempting to gain or successfully
gaining , unauthorized access to computer is called Hacking .
Who is a Hacker ?
❖ In the computer security context , a hacker is some one who
seeks and exploits weakness in a computer system or
computer network .
❖ The term hacker is reclaimed by computer programmers who
argue that some one breaking into computers is better called
a cracker.
Why do hackers hack ?
❖ Just for fun.
❖ Show off .
❖ Hack other systems secretly .
❖ Notify many people their thought .
❖ Steal important information .
❖ Destroy enemy’s computer network during the war .
Types of Hacking
❖ Website Hacking
❖ Network Hacking
❖ Ethical Hacking
❖ Email Hacking
❖ Password Hacking
❖ Online banking Hacking
❖ Computer Hacking
1.Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website .
2. Network Hacking
Network hacking is generally means gathering
information about domain by using tools like Telnet , Ns
Lookup , ping , Tracert , Net stat etc…. Over the network .
3.Ethical Hacking
Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them .
4.Email Hacking
Email hacking is illicit access to an email account
or email correspondence .
5.Password Hacking
Password hacking is the process of recovering secret
passwords from data that has been stored in or transmitted
by a computer system .
6.Online Banking Hacking
Online Banking hacking unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online Banking
Hacking .
7.Computer Hacking
Computer hacking is when files on your computer are viewed ,
created , or edited without your authorization .
Advantages of Hacking
❖ Can be used to recover lost information where the
computer passwords has been lost .
❖ Teaches you that no technology is 100% secure .
❖ To test how good security is on your own network.
❖ They call it white hat computer hacking .
Disadvantages of Hacking
❖ Criminals can use it to their advantage .
❖ It can harm someone’s privacy .
❖ It is illegal .

More Related Content

PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Haking PPT
PPTX
HACKING
PPTX
Hacking
ODP
Ethical hacking ppt
PPTX
Is hacking good or bad
PPTX
Ethical Hacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Haking PPT
HACKING
Hacking
Ethical hacking ppt
Is hacking good or bad
Ethical Hacking

What's hot (20)

PPTX
Hacking (cs192 report )
PPT
Ethical hacking
PPTX
PPTX
Hacking ppt
PPTX
Ethical Hacking
PPT
All about Hacking
PPT
PPTX
Hacking and Hackers
PPSX
Hacking
PPTX
Hacking
PDF
What is Hacking? AND Types of Hackers
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hackers
PPTX
PPTX
Hacking
RTF
Hacking and its types
PPTX
Hacking
PPTX
Hacking Vs Cracking in Computer Networks
ODP
Introduction To Hacking
PPTX
Ethical hacking
Hacking (cs192 report )
Ethical hacking
Hacking ppt
Ethical Hacking
All about Hacking
Hacking and Hackers
Hacking
Hacking
What is Hacking? AND Types of Hackers
Ethical hacking-presentation-updated(1by )Rasheed
Hackers
Hacking
Hacking and its types
Hacking
Hacking Vs Cracking in Computer Networks
Introduction To Hacking
Ethical hacking

Similar to Hacking (20)

PPTX
PPTX
Hacking
PPTX
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PPTX
Hacking
PPTX
Hacking & its types
PPTX
Hacking and Online Security
PPTX
Hacking and its types
PPTX
Hacking (basic)
PPTX
HACKING AND ITS TYPES.pptx
PPTX
Ethical hacking
PPTX
Hacking & Hackers
PDF
Hacking
PPTX
PDF
Unit ii-hackers and cyber crimes
PDF
Hackers and cyber crimes
PPTX
ETHICAL HACKING
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
Hacking (1)
PPTX
Cyber Crime And Security
Hacking
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking
Hacking & its types
Hacking and Online Security
Hacking and its types
Hacking (basic)
HACKING AND ITS TYPES.pptx
Ethical hacking
Hacking & Hackers
Hacking
Unit ii-hackers and cyber crimes
Hackers and cyber crimes
ETHICAL HACKING
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
Hacking (1)
Cyber Crime And Security

More from ANUSHAMOL2 (14)

PPTX
9 B.pptx
PPTX
9 B.pptx
PDF
Factors influencing for social change
PDF
Factors influencing for the social change
PPTX
Netiquette.ppt
PPTX
Netiquette.ppt
PDF
Netiquette - Anushamol.pdf
PDF
Factors influencing Social change
PDF
Netiquette
PDF
Netiquette
PDF
Netiquette
PPTX
Hacking
PDF
Hacking
PDF
Hacking
9 B.pptx
9 B.pptx
Factors influencing for social change
Factors influencing for the social change
Netiquette.ppt
Netiquette.ppt
Netiquette - Anushamol.pdf
Factors influencing Social change
Netiquette
Netiquette
Netiquette
Hacking
Hacking
Hacking

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Sports Quiz easy sports quiz sports quiz
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Lesson notes of climatology university.
PDF
RMMM.pdf make it easy to upload and study
PPTX
master seminar digital applications in india
PDF
01-Introduction-to-Information-Management.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharma ospi slides which help in ospi learning
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Types and Its function , kingdom of life
Sports Quiz easy sports quiz sports quiz
TR - Agricultural Crops Production NC III.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Lesson notes of climatology university.
RMMM.pdf make it easy to upload and study
master seminar digital applications in india
01-Introduction-to-Information-Management.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial disease of the cardiovascular and lymphatic systems
Pharma ospi slides which help in ospi learning

Hacking

  • 1. ASSIGNMENT Anushamol R A Roll no.28 Physical science
  • 2. HACKING History of Hacking ❖ Hacking has been a part of computing for 40 years. ❖ The first computer hacker emerged at MIT . ❖ Hacking is began in the 1960 at MIT, origin of the term ‘hacker’. ❖ The truth hacker amongst our societies have thirst for the knowledge . ❖ Boredom is never an object of challenge for the hacker . What is Hacking ? The process of attempting to gain or successfully gaining , unauthorized access to computer is called Hacking . Who is a Hacker ? ❖ In the computer security context , a hacker is some one who seeks and exploits weakness in a computer system or computer network . ❖ The term hacker is reclaimed by computer programmers who argue that some one breaking into computers is better called a cracker. Why do hackers hack ? ❖ Just for fun. ❖ Show off . ❖ Hack other systems secretly . ❖ Notify many people their thought . ❖ Steal important information . ❖ Destroy enemy’s computer network during the war . Types of Hacking
  • 3. ❖ Website Hacking ❖ Network Hacking ❖ Ethical Hacking ❖ Email Hacking ❖ Password Hacking ❖ Online banking Hacking ❖ Computer Hacking 1.Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website . 2. Network Hacking Network hacking is generally means gathering information about domain by using tools like Telnet , Ns Lookup , ping , Tracert , Net stat etc…. Over the network . 3.Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them . 4.Email Hacking Email hacking is illicit access to an email account or email correspondence . 5.Password Hacking Password hacking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system . 6.Online Banking Hacking Online Banking hacking unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online Banking Hacking .
  • 4. 7.Computer Hacking Computer hacking is when files on your computer are viewed , created , or edited without your authorization . Advantages of Hacking ❖ Can be used to recover lost information where the computer passwords has been lost . ❖ Teaches you that no technology is 100% secure . ❖ To test how good security is on your own network. ❖ They call it white hat computer hacking . Disadvantages of Hacking ❖ Criminals can use it to their advantage . ❖ It can harm someone’s privacy . ❖ It is illegal .