SlideShare a Scribd company logo
HACKING By Nurlyana Adiela Anuar.
>Definitions< Hacker :   any programming specialist who has expertise to enter computer network unauthorized.  Hacking :   act of illegally entering a computer system, and making unauthorized changes to the files and data contain within.
>Have You been Hacked?< Discovering emails in your sent items folder that were not written nor sent by you. Finding that files have been moved, or even disappeared. Observing that desktop icons or toolbars are blank or missing.
>What Should You Do?< Shut off all connection to the internet.  It will stop the attacks so that your information will be protected. You should  have a firewall installed  in your system. Many firewalls (ex. Zonealarm) are able to maintained detail description of attempted intrusions.  Restore and enhanced a compromised system  to avoid any potential problems in your  information system.
>Ethical Hacking< Preventing intruders’ threats in gaining admission into a computer system. Avoiding damage on a company’s system, nor steal information. Keeping information about a client  confidential when testing their security system.
>Conclusion< The outcome of hacking cyberspace is neither good nor bad, positive nor negative, constructive nor destructive. It compromises a general strategy by which to explore and manipulate the systems of rationality by which these modes of assessment become possible, function, and make sense.
>Reference< http://www.wsu.edu/~mejia1/WhatHack.html http://www.bama.ua.edu/~wilso098/project/sources.html
THE END

More Related Content

PPTX
Keeping Data Safe in a Hackers' World
PDF
Network Security Presentation
PDF
Hacker Tricks: How You Can Protect Yourself
PPT
CounterSnipe Network Security
PPTX
Safe computing (Tips & Tricks)
PPTX
IT Security for Small Business
PPTX
Computer Awareness Training
PPTX
Improve Your Network Security w/ 4 Firewall Optimizing Techniques
Keeping Data Safe in a Hackers' World
Network Security Presentation
Hacker Tricks: How You Can Protect Yourself
CounterSnipe Network Security
Safe computing (Tips & Tricks)
IT Security for Small Business
Computer Awareness Training
Improve Your Network Security w/ 4 Firewall Optimizing Techniques

What's hot (18)

PPT
WE16 - Defense in Depth: Top 10 Critical Security Controls
PPTX
Network basic security
PDF
Cybersecurity Awareness Month Tips
PPT
Hacker
PPTX
Network security threats and solutions
PDF
What is Network Security?
PDF
7 Signs that Tell your Computer has been Hacked
PPT
Adult Internet Safety
PPTX
Basics of Network Security
PDF
Profile securitarian
PPTX
Network Situational Awareness using Tripwire IP360
PPT
Security Measures
PPTX
Spyware risk it's time to get smart
PDF
Understanding Keylogger
PPTX
Device security Tips
PPTX
Network Security
WE16 - Defense in Depth: Top 10 Critical Security Controls
Network basic security
Cybersecurity Awareness Month Tips
Hacker
Network security threats and solutions
What is Network Security?
7 Signs that Tell your Computer has been Hacked
Adult Internet Safety
Basics of Network Security
Profile securitarian
Network Situational Awareness using Tripwire IP360
Security Measures
Spyware risk it's time to get smart
Understanding Keylogger
Device security Tips
Network Security

Similar to Hacking (20)

PDF
VTU network security(10 ec832) unit 6 notes
PPTX
Hacking 1
PDF
Introduction of hacking and cracking
PPT
Aiman
PPT
Dos and Dont to be followed to protect information and technology
PPTX
Network Security Basics in networking to learn
PPTX
Hacking and Online Security
DOCX
Chapter 10.0
PPTX
Computer Security(Hacking & Cracking) .pptx
PDF
Network Security Fundamentals
PDF
Linux Security best Practices with Fedora
DOCX
Computer security and privacy
PPTX
User security awareness
PDF
Module 3-cyber security
PPTX
Information security
PPT
Advanced internetfinal
PPT
Advanced Internet Final
PPTX
Internet safety and you
PDF
Ethical hacking and social engineering
PPT
Computer security
VTU network security(10 ec832) unit 6 notes
Hacking 1
Introduction of hacking and cracking
Aiman
Dos and Dont to be followed to protect information and technology
Network Security Basics in networking to learn
Hacking and Online Security
Chapter 10.0
Computer Security(Hacking & Cracking) .pptx
Network Security Fundamentals
Linux Security best Practices with Fedora
Computer security and privacy
User security awareness
Module 3-cyber security
Information security
Advanced internetfinal
Advanced Internet Final
Internet safety and you
Ethical hacking and social engineering
Computer security

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
A Presentation on Artificial Intelligence
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Getting Started with Data Integration: FME Form 101
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
cloud_computing_Infrastucture_as_cloud_p
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Assigned Numbers - 2025 - Bluetooth® Document
A Presentation on Artificial Intelligence
Programs and apps: productivity, graphics, security and other tools
Getting Started with Data Integration: FME Form 101
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
OMC Textile Division Presentation 2021.pptx
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25-Week II

Hacking

  • 1. HACKING By Nurlyana Adiela Anuar.
  • 2. >Definitions< Hacker : any programming specialist who has expertise to enter computer network unauthorized. Hacking : act of illegally entering a computer system, and making unauthorized changes to the files and data contain within.
  • 3. >Have You been Hacked?< Discovering emails in your sent items folder that were not written nor sent by you. Finding that files have been moved, or even disappeared. Observing that desktop icons or toolbars are blank or missing.
  • 4. >What Should You Do?< Shut off all connection to the internet. It will stop the attacks so that your information will be protected. You should have a firewall installed in your system. Many firewalls (ex. Zonealarm) are able to maintained detail description of attempted intrusions. Restore and enhanced a compromised system to avoid any potential problems in your information system.
  • 5. >Ethical Hacking< Preventing intruders’ threats in gaining admission into a computer system. Avoiding damage on a company’s system, nor steal information. Keeping information about a client confidential when testing their security system.
  • 6. >Conclusion< The outcome of hacking cyberspace is neither good nor bad, positive nor negative, constructive nor destructive. It compromises a general strategy by which to explore and manipulate the systems of rationality by which these modes of assessment become possible, function, and make sense.