SlideShare a Scribd company logo
Hackingppt 160730081605
INTRODUCTION
APPLICATION AREA OF HACKING
ADVANTAGES & DISADVANTAGES
INTRODUCTION
Hacking is the method of breaking into
information system without proper
authentication and permission.
1. 2. 3.
White
hat
Black
hat
Grey
hat
TYPES OF HACKER
White hat
A white hat hacker breaks security for non-malicious reasons, perhaps
to test their own security system or while working for a security
company which makes security software. The term "white hat" in
Internet slang refers to an ethical hacker.
The EC-Council ganizations that have developed certifications,
courseware, classes, and online training covering the diverse arena of
Ethical Hacking.
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason
beyond maliciousness or for personal gain" (Moore, 2005)..
Black hat hackers are also referred to as the "crackers" within the security industry and
by modern programmers.
Grey hat
A grey hat hacker is a combination of a black hat and a white hat hacker.
A grey hat hacker may surf the internet and hack into a computer
system for the sole purpose of notifying the administrator that their
system has a security defect
They may then offer to correct the defect for a fee.
APPLICATI
ON AREA
OF
HACKING
Password Hacking
Email Hacking
Web Site Hacking
1
2
3
Credit card number Ha
4
Password Hacking
A password is a combination of characters that a user uses for protecting
information. Once a file or a determined section of a hard disk is protected by a
password, only those that know it can access it.
1. The most common used tool to hack the password is social engineering. Social
engineering consists in making a user believe that he is giving confidential
information to a trusted party.
2. Another way of Hacking passwords is through a hash function
Email Hacking
Yes, almost anything can be hacked in the Internet. There are several methods for
Hacking yahoo, msn email accounts.
1. One of these methods is social engineering.
2. Hacking yahoo messenger or any other messenger is quite easy if you know the
person’s Email ID.
Credit card Hacking
Credit card Hacking has become one of the new security headaches of
consumers. Although in face to face transactions the percentage of credit card
fraud is almost a tenth of a percent, in online transactions it's as high as two or
three percent.
1. Phishing
2. Through a website.
There are many ways to hack the credit card number. But the following two ways are
often used to hack the number.
Advantages of Hacking
Can be used to recover information where the password has been lost.
• There may be the situation when you can forget your password. At that time
you can get your password by simply Hacking your computers.
To test how good security is on your network / computer.
• As the data is important thing in an organization or in your computer. All of
us want to secure their data. How one can find out whether there system is
secure or not. Th4e answer is simply by Hacking your own system/network.
Disadvantages of Hacking
Criminals can use it to their advantage
• As the data is important thing in an organization / on your computer. Some
criminal can hack you network/system and can be access your data so he/she can
use this data for their use and u have to be face to a big loss.
• If he/she successfully hack your system at that time they can able to enter your
privacy area due to which he/she can access your private data.
It can harm someone's privacy
It's Illegal.
• Accessing some once private data without its permission is a crime, which is
illegal.
It destroys other works
• As competition is increases maintaining the quality and standard is most
important thing. Suppose that you create /make a good project and your opponent
hack your system. At this situation he/she can destroy your work, because of which
you have to face a big loss.
Thanks

More Related Content

PPTX
Hacking ppt
PPTX
Hacking
PPT
Ia 124 1621324160 ia_124_lecture_02
PPTX
Preventions of Email Hacking
PPTX
Hacking
PDF
PPTX
Β. Hucking
PPTX
Cyber crime introduction awareness program at st. xavier
Hacking ppt
Hacking
Ia 124 1621324160 ia_124_lecture_02
Preventions of Email Hacking
Hacking
Β. Hucking
Cyber crime introduction awareness program at st. xavier

What's hot (20)

PPTX
security privacy,security,web,internet,prevention from hackers,the onion rout...
PPTX
Hacking
PPTX
Ethical hacking
PDF
Social Engineering: the Bad, Better, and Best Incident Response Plans
PPTX
Internet safety
PPTX
Email phishing and countermeasures
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
PDF
Security Awareness Training
PPTX
Introduction to Hacking
PDF
Five habits that might be a cyber security risk
PPTX
Is hacking good or bad
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
DOCX
Cyber crime
PPTX
Computing and ethics
DOCX
Cyber crime ethics and un ethics
PPT
Cyber Crime & Security
DOCX
Computer virus
PPTX
Cybersecurity Awareness
PPT
Ch01
PPT
Module 3 social engineering-b
security privacy,security,web,internet,prevention from hackers,the onion rout...
Hacking
Ethical hacking
Social Engineering: the Bad, Better, and Best Incident Response Plans
Internet safety
Email phishing and countermeasures
Phishing, Pharming, and the latest potholes on the Information Highway
Security Awareness Training
Introduction to Hacking
Five habits that might be a cyber security risk
Is hacking good or bad
Class 11 ca chapter 17 computer ethics and cyber crime
Cyber crime
Computing and ethics
Cyber crime ethics and un ethics
Cyber Crime & Security
Computer virus
Cybersecurity Awareness
Ch01
Module 3 social engineering-b

Similar to Hackingppt 160730081605 (20)

PPTX
Hacking Presentation v2 By Raffi
PDF
Ethical-Hacking.pdf
PDF
Why Ethical Hacking Course in 2022.pdf
PDF
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PDF
Puna 2015
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PDF
Ethical Hacking And Hacking Attacks
PDF
Ethical hacking
PDF
IRJET- Study of Hacking and Ethical Hacking
PPTX
Ethical Hacking
PPTX
TM112 Meeting10-Dangerous Data.pptx
PPTX
Ethical Hacking & Network Security
PDF
Module 3-cyber security
PPTX
Cyber Crime And Security
DOCX
Final report ethical hacking
PDF
Ethical hacking and social engineering
PPT
Home cyber security
PPSX
Hacking
PPT
Computer hacking
PPTX
cyber crime
Hacking Presentation v2 By Raffi
Ethical-Hacking.pdf
Why Ethical Hacking Course in 2022.pdf
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Puna 2015
Ethical hacking Chapter 1 - Overview.pptx
Ethical Hacking And Hacking Attacks
Ethical hacking
IRJET- Study of Hacking and Ethical Hacking
Ethical Hacking
TM112 Meeting10-Dangerous Data.pptx
Ethical Hacking & Network Security
Module 3-cyber security
Cyber Crime And Security
Final report ethical hacking
Ethical hacking and social engineering
Home cyber security
Hacking
Computer hacking
cyber crime

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Spectroscopy.pptx food analysis technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Group 1 Presentation -Planning and Decision Making .pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Spectroscopy.pptx food analysis technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Hackingppt 160730081605

  • 2. INTRODUCTION APPLICATION AREA OF HACKING ADVANTAGES & DISADVANTAGES
  • 4. Hacking is the method of breaking into information system without proper authentication and permission.
  • 6. White hat A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. The EC-Council ganizations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
  • 7. Black hat A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers.
  • 8. Grey hat A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect They may then offer to correct the defect for a fee.
  • 9. APPLICATI ON AREA OF HACKING Password Hacking Email Hacking Web Site Hacking 1 2 3 Credit card number Ha 4
  • 10. Password Hacking A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. 1. The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party. 2. Another way of Hacking passwords is through a hash function
  • 11. Email Hacking Yes, almost anything can be hacked in the Internet. There are several methods for Hacking yahoo, msn email accounts. 1. One of these methods is social engineering. 2. Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.
  • 12. Credit card Hacking Credit card Hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. 1. Phishing 2. Through a website. There are many ways to hack the credit card number. But the following two ways are often used to hack the number.
  • 13. Advantages of Hacking Can be used to recover information where the password has been lost. • There may be the situation when you can forget your password. At that time you can get your password by simply Hacking your computers. To test how good security is on your network / computer. • As the data is important thing in an organization or in your computer. All of us want to secure their data. How one can find out whether there system is secure or not. Th4e answer is simply by Hacking your own system/network.
  • 14. Disadvantages of Hacking Criminals can use it to their advantage • As the data is important thing in an organization / on your computer. Some criminal can hack you network/system and can be access your data so he/she can use this data for their use and u have to be face to a big loss. • If he/she successfully hack your system at that time they can able to enter your privacy area due to which he/she can access your private data. It can harm someone's privacy It's Illegal. • Accessing some once private data without its permission is a crime, which is illegal. It destroys other works • As competition is increases maintaining the quality and standard is most important thing. Suppose that you create /make a good project and your opponent hack your system. At this situation he/she can destroy your work, because of which you have to face a big loss.