SlideShare a Scribd company logo
What is Hacking and its
terms
Who is Hacker?
•Hacker is a person who find weakness in computer
systems or networks to exploit its weaknesses to gain
access.
• Hacker is a person who think outside the box
• Hacker is a person who have lot of knowledge about
computer as compare to any developer.
• All hacker are not criminals it depends on their work.
What is Hacking?
•Hacking is identifying weakness in computer systems or
networks to exploit its weaknesses to gain access.
• Example of Hacking: Using password cracking algorithm
to gain access to a system
• Hacking refers to activities that seek to compromise
digital devices, such as computers, smartphones, tablets,
and even entire networks. And while hacking might not
always be for malicious purposes, nowadays most
references to hacking, and hackers, characterize it/them
as unlawful activity by cybercriminals—motivated by
financial gain, protest, information gathering (spying),
and even just for the “fun” of the challenge..
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer
systems and/or computer networks and coming with
countermeasures that protect the weaknesses. Ethical
hackers must abide by the following rules.
•Get written permission from the owner of the computer
system and/or computer network before hacking.
•Protect the privacy of the organization been hacked.
•Transparently report all the identified weaknesses in the
computer system to the organization.
•Inform hardware and software vendors of the identified
weaknesses
Why Ethical Hacking?
•Information is one of the most valuable assets of an
organization. Keeping information secure can protect an
organization’s image and save an organization a lot of
money.
•Hacking can lead to loss of business for organizations
that deal in finance such as PayPal. Ethical hacking puts
them a step ahead of the cyber criminals who would
otherwise lead to loss of business.
Can Hacking is legal or not?
•It depends on hacker work.
•Hacking is not a crime if you have all permission for
hack a particular computer or network.
•Hacking is a beautiful art that can’t have by everyone
•So hacking is a legal if you hack our own computer
or network
Thanks
If you interested in Ethical hacking, web development
then contact me I teach you at lowest price as
possible. All classes are online held at skype etc.
Contact No: 8195059899
(Kunal Verma)

More Related Content

PPT
Brief Introduction of Hackers
PPT
TYPES OF HACKING
PPT
hacking
PPTX
Persentation
PPTX
Ethical Hacking
PPTX
Ethical hacking composed
PPTX
Introduction to hacking
PPTX
presentation on ethical hacking
Brief Introduction of Hackers
TYPES OF HACKING
hacking
Persentation
Ethical Hacking
Ethical hacking composed
Introduction to hacking
presentation on ethical hacking

What's hot (20)

PPTX
HACKING
DOCX
Ehtical hacking speech
PPTX
Cybercrime (Computer Hacking)
PPTX
Secure Shell - a Presentation on Ethical Hacking
PPTX
Computer and Internet hacking
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacking ppt
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPT
Introduction To Ethical Hacking
PPTX
Etical hacking
PPT
Introduction to hackers
PPTX
ethical hacking in the modern times
PPTX
Hacking and Hackers
PPTX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
ethical hacking
PPTX
Ethical hacking by chandra prakash upadhyay
PPTX
Hacking
HACKING
Ehtical hacking speech
Cybercrime (Computer Hacking)
Secure Shell - a Presentation on Ethical Hacking
Computer and Internet hacking
Ethical hacking-presentation-updated(1by )Rasheed
Hacking ppt
Basic of Ethical Hacking and Penetration Testing - 1st Module
Introduction To Ethical Hacking
Etical hacking
Introduction to hackers
ethical hacking in the modern times
Hacking and Hackers
Ethical hacking
Ethical Hacking
Ethical hacking
Ethical hacking
ethical hacking
Ethical hacking by chandra prakash upadhyay
Hacking

Similar to Hacking and its terms (20)

PPTX
Hacking
PPTX
What Is Hacking
PPTX
Ethical Hacking.pptx
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
Hacking
PPTX
Hacking Presentation v2 By Raffi
PPTX
Ethical Hacking (basics)
PPTX
Hacking and Online Security
PPTX
Ethical hacking & cyber security
PPSX
Hacking
PPTX
How to hack or what is ethical hacking
PPTX
Cyber hacking dev days by aes team
PPTX
Ethical Hacking
PPTX
ethical hacking
PPTX
Ethics and safety measures in computing.pptx
PPTX
Fundamental of ethical hacking
PPT
Information security Presentation
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PPTX
Ethical Hacking
Hacking
What Is Hacking
Ethical Hacking.pptx
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Hacking
Hacking Presentation v2 By Raffi
Ethical Hacking (basics)
Hacking and Online Security
Ethical hacking & cyber security
Hacking
How to hack or what is ethical hacking
Cyber hacking dev days by aes team
Ethical Hacking
ethical hacking
Ethics and safety measures in computing.pptx
Fundamental of ethical hacking
Information security Presentation
Ethical hacking Chapter 1 - Overview.pptx
Ethical Hacking

Recently uploaded (20)

PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Lesson notes of climatology university.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx
Lesson notes of climatology university.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
VCE English Exam - Section C Student Revision Booklet
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Sports Quiz easy sports quiz sports quiz
Microbial diseases, their pathogenesis and prophylaxis
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Hacking and its terms

  • 1. What is Hacking and its terms
  • 2. Who is Hacker? •Hacker is a person who find weakness in computer systems or networks to exploit its weaknesses to gain access. • Hacker is a person who think outside the box • Hacker is a person who have lot of knowledge about computer as compare to any developer. • All hacker are not criminals it depends on their work.
  • 3. What is Hacking? •Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. • Example of Hacking: Using password cracking algorithm to gain access to a system • Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge..
  • 4. What is Ethical Hacking? Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules. •Get written permission from the owner of the computer system and/or computer network before hacking. •Protect the privacy of the organization been hacked. •Transparently report all the identified weaknesses in the computer system to the organization. •Inform hardware and software vendors of the identified weaknesses
  • 5. Why Ethical Hacking? •Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. •Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
  • 6. Can Hacking is legal or not? •It depends on hacker work. •Hacking is not a crime if you have all permission for hack a particular computer or network. •Hacking is a beautiful art that can’t have by everyone •So hacking is a legal if you hack our own computer or network
  • 7. Thanks If you interested in Ethical hacking, web development then contact me I teach you at lowest price as possible. All classes are online held at skype etc. Contact No: 8195059899 (Kunal Verma)