SlideShare a Scribd company logo
UNIT – I
INTRODUCTION TO HACKING
AND NETWORKING
BY,
NAME : PREETHI T G
REG NO :19IFTE073
CONTENT
✓ Consequences of Intrusion
✓ Indirect Threats
✓ A word on hacking and hackers
Intrusion detection
• Intrusion detection is the art of discovering and identifying any intrusive
activities towards the networks system.
• In 1980, James P.Anderson introduced the ideas of intrusion detection and
outlining ways to improve computer security auditing and surveillance .
• Hence, intrusion detection system (IDS)has become very important to
strengthen the security, confidentiality and integrity of critical information
systems.
• Detection and analysis on the impacts of the malicious activities is the main
objective for intrusion detection and analysis system
What is Intrusion ?
Intrusion Detection System (IDS) is a security tool that is used to detect and analyze
the incoming traffic activities and to raise the alarm if the activities are identified as anomalous.
Basically, there are two types of intrusion detection systems: Host-based Intrusion Detection
System (HIDS) and Network-based Intrusion Detection System (NIDS).
1. Network intrusion detection System
NIDS monitors and analyses external event such as traffic volume, IP address, service port
and content of individual packets flowing through a network to look for possible attacks. NIDS
consists of the sensor and the console; these two components are placed in front of firewalls or at
key network choke point. Normally the console acts as the central management which raises the
alert when there is a possible intrusion happened. The sensor which is located on a segment of the
network, normally in the demilitarized (DMZ) or at network borders, is used to capture all network
traffic and analyze the contents. Below are the advantages and disadvantages of NIDS.
Advantages:
❖ It can monitor the whole network from one location.
❖ It can identify network traffic patterns and troubleshoot network problems.
❖ It can protect whole network from intrusion.
Disadvantages:
(a) It generates false alarm easily.
(b) Unable to detect certain attacks (false negative).
(c) Unable to understand host specific processes or protect from unauthorized
physical access.
(d) Unable to detect network in different network segments.
Example: Snort, Bro
2) Host-based intrusion detection system (HIDS) :
HIDS analyses internal event such as process identifier, system calls, application logs, file-system modifications
(binaries, password files, capability databases, access control lists and other host activities and state. Every single
network traffics needs to be analyzed before passing the host. Therefore, HIDS is useful for monitoring potentially
dangerous user activities within the network. HIDS is installed locally on host machine such as servers, workstations,
notebooks and computers. Therefore HIDS is a very versatile system compared to NIDS. Here are some of the advantages
and disadvantages for HIDS.
Advantages:
1) Low false positive rate.
2) It has nearly real-time detection and response.
3) It suits well in encrypted environment.
4) It works well in switched network.
5) It monitors all system activities.
Disadvantages:
1) HIDS stops working once the host machine is compromised.
2) OS dependent.
Example: OSSEC
➢ Google and other web-services often directly display or otherwise present data which may
lead to some users not visiting the page (where they might discover other information that
goes beyond what they originally looked for but it is interest to them) which may or may not
be considered an issue
➢ Google and other sites could display a visible button or alike next to that data so that at
least if one would be interested in some more info one could easily and quickly get to the
appropriate article (as of right now Google seems to do this for the most part), other
tools and services that for instance read snippets of articles could have commands built
in to somehow open the page on their display or some linked device or ‘tell me more’ for
reading the entire page (or its table of contents)
➢ (Maliciously altered) forks
Indirect threats
❑ Censorship within the page by ill-intentioned administrators or via direct or
indirect government control.
❑ Incompetence of the WMF (e.g. causing overspending)
❑ Policies becoming inflexible or not adapting to new realities
❑ Targeted attacks against individual or groups (such as harassment,
hacking, social undermining, blackmailing and kompromat and account-
takeovers)
❑ Improve anonymous access-methods, a registration group/page for such
incidents, building ways to prove one’s identity if it was stolen
➢ Targeted manipulation of Page editors and admins : more decentralization,
➢ Quality decline (e.g. by online marketing, paid editing, Internet trolls,
widespread use of bad journalistic research in WP:RS, or hard-to-detect
vandalism)
➢ Spamming and Internet bots inserting malicious content
➢ Laws and similar measures that damage that page and make it significantly
harder to maintain it : lobbying, page – blackout
➢ Debates getting undermined via non- or semi-substantial arguments and sheer
number of voters
➢ Linking voters to their arguments and linking these to counterarguments and
having internal decision makers pay closer attention to spuch argumentation-
chains, identifying canvassing & manipulators
What is Hacking ?
▪ There are many definitions of hacking.
▪ In this article, we will define hacking as identifying
weakness in computer systems and/or networks and
exploiting the weaknesses to gain access.
▪ An example of hacking is using by passing the login
algorithm to gain access to a system.
What is Hacker ?
▪ A Hacker is a person who finds and exploits
weakness in computer systems and/or networks to gain
access.
▪ Hackers are usually skilled computer programmers
with knowledge of computer security.
TYPES OF HACKERS :
Hackers are classified according to the intent of their actions.
The following list classifies hackers according to their intent.
Ethical Hacker (White hat):
A hacker who gains access to systems with a view to fix the identified
weaknesses.
They may also perform penetration testing and vulnerability
assessments.
Cracker (Black hat):
A hacker who gains unauthorized access to computer systems for
personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
Grey hat:
A hacker who is in between ethical and black hat hackers.
He/she breaks into computer systems without authority with a
view to identify weaknesses and reveal them to the system
owner.
Script kiddies:
A non-skilled person who gains access to computer systems
using already made tools.
Hacktivist :
A hacker who use hacking to send social, religious, and political etc.
messages.
This is usually done by hijacking websitesand leaving the message on
the hijacked website.
Phreaker :
A hacker who identifies and exploits weaknesses in telephones instead
of computers.
10 sure signs you’ve been hacked
1. Fake antivirus messages
2. Unwanted browser toolbars
3. Redirected Internet searches
4. Frequent random popups
5. Your friends receive fake emails from your email account
6. Your online passwords suddenly change
7. Unexpected software installs
8. Your mouse moves between programs and makes correct
selections
9.Your antimalware software, Task Manager, or Registry Editor is
disabled and can’t be restarted
10. Your bank account is missing money
10 Ways to Protect Yourself from Hackers
Online
1.Make your password harder to hack
2. Change your password regularly
3. Clear your browser history
4. Do not use free Wi-Fi
5. Watch what you click
6. Try not to use public computers
7. Use anti-virus protection
8. Do not trust unknown person in the net
9. Use a VPN
10. hide your router name and Use Mac filter
Best Ways to Protect Yourself
from Hackers is
Knowledge
! . . . . .THANK YOU . . . . . !

More Related Content

PPTX
Computer virus
PPTX
Ethical Hacking
PPTX
External threats-to-information-system
PPTX
Cyber warfare introduction
PDF
Internet Safety Glossary of Terms
PPTX
Cyber warfare an architecture for deterrence
PPTX
Cyber security
PPTX
Computer security and
Computer virus
Ethical Hacking
External threats-to-information-system
Cyber warfare introduction
Internet Safety Glossary of Terms
Cyber warfare an architecture for deterrence
Cyber security
Computer security and

What's hot (20)

PPTX
Cyber crime types
PPTX
Unit iii: Common Hacking Techniques
PPTX
PDF
Brian Sanders - Business Electronic Compromise (BEC)
PPTX
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
PDF
Insider threat-what-us-do d-want
PPSX
Unit 2
PPTX
Introduction to ethical hacking
PPTX
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
PPTX
Security
PPTX
Cybercrime 111205224958-phpapp02
PPT
Cyber Terrorism Presentation
PDF
Social Engineering 2.0
PDF
Cyber Crime Types & Tips
PPTX
Cyber Terrorism
PDF
CNIT 123 Ch 1: Ethical Hacking Overview
PDF
Jameel Nabbo Cyber Security conference
PPTX
Cyber crime: A Quick Survey
PDF
Hackers and cyber crimes
PDF
Unit ii-hackers and cyber crimes
Cyber crime types
Unit iii: Common Hacking Techniques
Brian Sanders - Business Electronic Compromise (BEC)
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Insider threat-what-us-do d-want
Unit 2
Introduction to ethical hacking
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
Security
Cybercrime 111205224958-phpapp02
Cyber Terrorism Presentation
Social Engineering 2.0
Cyber Crime Types & Tips
Cyber Terrorism
CNIT 123 Ch 1: Ethical Hacking Overview
Jameel Nabbo Cyber Security conference
Cyber crime: A Quick Survey
Hackers and cyber crimes
Unit ii-hackers and cyber crimes

Similar to Hacking and protecting yourself from hackers . (20)

PPT
All about Hacking
PPT
PPT
How to become Hackers .
PPTX
Dhams hacking
PPTX
hacking basics
PPT
Hackers Cracker Network Intruder
PPT
001.itsecurity bcp v1
PPTX
M1_Introduction_IPS.pptx
PDF
Ethical Hacking
PPT
PPT
Hackers
PPT
Hackers
PPT
Introduction to hackers
PPTX
Lecture 1-2.pptx
PPTX
Network security (vulnerabilities, threats, and attacks)
PDF
The Basics of Protecting Against Computer Hacking
PPTX
Lec 2- Hardening and whitelisting of devices
PPTX
Hacking
PPTX
Intrusion detection system
PPTX
introduction class1(HACKING), basic information
All about Hacking
How to become Hackers .
Dhams hacking
hacking basics
Hackers Cracker Network Intruder
001.itsecurity bcp v1
M1_Introduction_IPS.pptx
Ethical Hacking
Hackers
Hackers
Introduction to hackers
Lecture 1-2.pptx
Network security (vulnerabilities, threats, and attacks)
The Basics of Protecting Against Computer Hacking
Lec 2- Hardening and whitelisting of devices
Hacking
Intrusion detection system
introduction class1(HACKING), basic information

More from Preethi T G (14)

PPTX
Data communication and networks by B. Forouzan
PPTX
Multimedia by Tay Vaughan
PDF
National symbols of india
PDF
Files in Operating system
PPTX
Various cultures in Tamil Nadu
DOCX
Normalization in relational database management systems
PPTX
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
PPTX
binary tree representation and traversal
PDF
Internet and world wide web
PPTX
Fundamental Rights and Duties
PPTX
Software engineering project(Bikes and scooters rental system)
PDF
Principles of programming languages(Functional programming Languages using LISP)
PPTX
Relational Database Management System(TCS)
PPTX
Computer organisation and architecture
Data communication and networks by B. Forouzan
Multimedia by Tay Vaughan
National symbols of india
Files in Operating system
Various cultures in Tamil Nadu
Normalization in relational database management systems
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
binary tree representation and traversal
Internet and world wide web
Fundamental Rights and Duties
Software engineering project(Bikes and scooters rental system)
Principles of programming languages(Functional programming Languages using LISP)
Relational Database Management System(TCS)
Computer organisation and architecture

Recently uploaded (20)

PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
top salesforce developer skills in 2025.pdf
PDF
medical staffing services at VALiNTRY
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
System and Network Administraation Chapter 3
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
AI in Product Development-omnex systems
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Essential Infomation Tech presentation.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
top salesforce developer skills in 2025.pdf
medical staffing services at VALiNTRY
Design an Analysis of Algorithms I-SECS-1021-03
How to Migrate SBCGlobal Email to Yahoo Easily
VVF-Customer-Presentation2025-Ver1.9.pptx
Design an Analysis of Algorithms II-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
Wondershare Filmora 15 Crack With Activation Key [2025
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
System and Network Administraation Chapter 3
How to Choose the Right IT Partner for Your Business in Malaysia
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
AI in Product Development-omnex systems
Understanding Forklifts - TECH EHS Solution
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PTS Company Brochure 2025 (1).pdf.......
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Essential Infomation Tech presentation.pptx

Hacking and protecting yourself from hackers .

  • 1. UNIT – I INTRODUCTION TO HACKING AND NETWORKING BY, NAME : PREETHI T G REG NO :19IFTE073
  • 2. CONTENT ✓ Consequences of Intrusion ✓ Indirect Threats ✓ A word on hacking and hackers
  • 3. Intrusion detection • Intrusion detection is the art of discovering and identifying any intrusive activities towards the networks system. • In 1980, James P.Anderson introduced the ideas of intrusion detection and outlining ways to improve computer security auditing and surveillance . • Hence, intrusion detection system (IDS)has become very important to strengthen the security, confidentiality and integrity of critical information systems. • Detection and analysis on the impacts of the malicious activities is the main objective for intrusion detection and analysis system
  • 4. What is Intrusion ? Intrusion Detection System (IDS) is a security tool that is used to detect and analyze the incoming traffic activities and to raise the alarm if the activities are identified as anomalous. Basically, there are two types of intrusion detection systems: Host-based Intrusion Detection System (HIDS) and Network-based Intrusion Detection System (NIDS). 1. Network intrusion detection System NIDS monitors and analyses external event such as traffic volume, IP address, service port and content of individual packets flowing through a network to look for possible attacks. NIDS consists of the sensor and the console; these two components are placed in front of firewalls or at key network choke point. Normally the console acts as the central management which raises the alert when there is a possible intrusion happened. The sensor which is located on a segment of the network, normally in the demilitarized (DMZ) or at network borders, is used to capture all network traffic and analyze the contents. Below are the advantages and disadvantages of NIDS.
  • 5. Advantages: ❖ It can monitor the whole network from one location. ❖ It can identify network traffic patterns and troubleshoot network problems. ❖ It can protect whole network from intrusion. Disadvantages: (a) It generates false alarm easily. (b) Unable to detect certain attacks (false negative). (c) Unable to understand host specific processes or protect from unauthorized physical access. (d) Unable to detect network in different network segments. Example: Snort, Bro
  • 6. 2) Host-based intrusion detection system (HIDS) : HIDS analyses internal event such as process identifier, system calls, application logs, file-system modifications (binaries, password files, capability databases, access control lists and other host activities and state. Every single network traffics needs to be analyzed before passing the host. Therefore, HIDS is useful for monitoring potentially dangerous user activities within the network. HIDS is installed locally on host machine such as servers, workstations, notebooks and computers. Therefore HIDS is a very versatile system compared to NIDS. Here are some of the advantages and disadvantages for HIDS. Advantages: 1) Low false positive rate. 2) It has nearly real-time detection and response. 3) It suits well in encrypted environment. 4) It works well in switched network. 5) It monitors all system activities. Disadvantages: 1) HIDS stops working once the host machine is compromised. 2) OS dependent. Example: OSSEC
  • 7. ➢ Google and other web-services often directly display or otherwise present data which may lead to some users not visiting the page (where they might discover other information that goes beyond what they originally looked for but it is interest to them) which may or may not be considered an issue ➢ Google and other sites could display a visible button or alike next to that data so that at least if one would be interested in some more info one could easily and quickly get to the appropriate article (as of right now Google seems to do this for the most part), other tools and services that for instance read snippets of articles could have commands built in to somehow open the page on their display or some linked device or ‘tell me more’ for reading the entire page (or its table of contents) ➢ (Maliciously altered) forks Indirect threats
  • 8. ❑ Censorship within the page by ill-intentioned administrators or via direct or indirect government control. ❑ Incompetence of the WMF (e.g. causing overspending) ❑ Policies becoming inflexible or not adapting to new realities ❑ Targeted attacks against individual or groups (such as harassment, hacking, social undermining, blackmailing and kompromat and account- takeovers) ❑ Improve anonymous access-methods, a registration group/page for such incidents, building ways to prove one’s identity if it was stolen
  • 9. ➢ Targeted manipulation of Page editors and admins : more decentralization, ➢ Quality decline (e.g. by online marketing, paid editing, Internet trolls, widespread use of bad journalistic research in WP:RS, or hard-to-detect vandalism) ➢ Spamming and Internet bots inserting malicious content ➢ Laws and similar measures that damage that page and make it significantly harder to maintain it : lobbying, page – blackout ➢ Debates getting undermined via non- or semi-substantial arguments and sheer number of voters ➢ Linking voters to their arguments and linking these to counterarguments and having internal decision makers pay closer attention to spuch argumentation- chains, identifying canvassing & manipulators
  • 10. What is Hacking ? ▪ There are many definitions of hacking. ▪ In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. ▪ An example of hacking is using by passing the login algorithm to gain access to a system. What is Hacker ? ▪ A Hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. ▪ Hackers are usually skilled computer programmers with knowledge of computer security.
  • 11. TYPES OF HACKERS : Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
  • 12. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. Script kiddies: A non-skilled person who gains access to computer systems using already made tools.
  • 13. Hacktivist : A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websitesand leaving the message on the hijacked website. Phreaker : A hacker who identifies and exploits weaknesses in telephones instead of computers.
  • 14. 10 sure signs you’ve been hacked 1. Fake antivirus messages 2. Unwanted browser toolbars 3. Redirected Internet searches 4. Frequent random popups 5. Your friends receive fake emails from your email account 6. Your online passwords suddenly change 7. Unexpected software installs 8. Your mouse moves between programs and makes correct selections 9.Your antimalware software, Task Manager, or Registry Editor is disabled and can’t be restarted 10. Your bank account is missing money
  • 15. 10 Ways to Protect Yourself from Hackers Online 1.Make your password harder to hack 2. Change your password regularly 3. Clear your browser history 4. Do not use free Wi-Fi 5. Watch what you click 6. Try not to use public computers 7. Use anti-virus protection 8. Do not trust unknown person in the net 9. Use a VPN 10. hide your router name and Use Mac filter
  • 16. Best Ways to Protect Yourself from Hackers is Knowledge ! . . . . .THANK YOU . . . . . !