SlideShare ist ein Scribd-Unternehmen logo
1 von 10
CONTENT…
 What means hacking?
 Natural and environmental threats
 Advantages of hacking
 Effects of hacking
Hacking is source of threat to security in computer .It is
defined as unauthorised access to the computer system
by hacker.
Hackers are persons who learn about the computer
system in detail.They write programe referred to as
hackers.Hackers may use a modem or cable to hack the
targeted computers.
NATURAL AND ENVIRONMENTAL
THREATS…
Computers are also threatened by natural or
environmental disaster.Be it home,stores,offices, and
also automobiles.Examples of natural and
environmental disaster:
 Flood
 Fire
 Earthquakes,storms,and tornados
 Excessive heat
 Inadequate Power Supply
ADVANTAGES OF HACKING…
Hacking has many advantages.hacking can involves testing
an organization’s networks.it also helps to identify any
weakneess that outside could tap.
Otherwise,it can use to test applications to find any flaws and
source codes.it can testing for the possibility of attacks from
someone to the wireless network,and checking for
unauthorised modems.
Later, hacking can helps an organization better protects its
systems and informations and it can be used to argumenting
the efforts of an organizations information technology
professionals.
EFFECTS OF HACKING…
Hacking also has many effects.hacking can expose
sensitive user data and risk user privacy.Hacking activities
expose confidental user information like personal
details,social security numbers,credit card number,bank
account data and personal photographs.User informations,in
the hand of computer hackers make it valnerable to
illegitimate use and manipulation.
Hackers may even delete sensitive informations on
gaining to it.Deletion or manipulation of sensitive data with
intent to achive personal gain is another effects of computer
haacking.A user whose computer has been hacked is at the
risk of losing all the data stored on his/her
computer.Manipulation of sensitive user data is a grave
consequence of hacking.
SOURCES OF REFERENCE…
 http://www.buzzle.com/articles/what-are-the-effects-
of-computer-hacking.html
 http://www.ehow.com/info_8431442_advantages-
ethical-hacking.html
 Reference book of ICT.
CONCLUSION…
Hacking fends to be a misunderstand topic,and
the media likes to sensationalize,which just exacerbates
this condition.Charges in terminology have been mostly
ineffective-what is needed in change of
mindset.Hackers are just people with innovative spirits
and an in-depth knowledge of technology.
GROUP MEMBER
 Shobana D/O Varathan
ASSESSOR’S OBSERVATION…
I feel so great with doing my my assigment with
my topic,hacking.Ihave learnt many things about
hacking.Hacking is a negative activity that we should not
follow.So,we have to follow or use computer and internet
by right way and according to Malaysia CyberLaw.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Hacking

  • 1.
  • 2. CONTENT…  What means hacking?  Natural and environmental threats  Advantages of hacking  Effects of hacking
  • 3. Hacking is source of threat to security in computer .It is defined as unauthorised access to the computer system by hacker. Hackers are persons who learn about the computer system in detail.They write programe referred to as hackers.Hackers may use a modem or cable to hack the targeted computers.
  • 4. NATURAL AND ENVIRONMENTAL THREATS… Computers are also threatened by natural or environmental disaster.Be it home,stores,offices, and also automobiles.Examples of natural and environmental disaster:  Flood  Fire  Earthquakes,storms,and tornados  Excessive heat  Inadequate Power Supply
  • 5. ADVANTAGES OF HACKING… Hacking has many advantages.hacking can involves testing an organization’s networks.it also helps to identify any weakneess that outside could tap. Otherwise,it can use to test applications to find any flaws and source codes.it can testing for the possibility of attacks from someone to the wireless network,and checking for unauthorised modems. Later, hacking can helps an organization better protects its systems and informations and it can be used to argumenting the efforts of an organizations information technology professionals.
  • 6. EFFECTS OF HACKING… Hacking also has many effects.hacking can expose sensitive user data and risk user privacy.Hacking activities expose confidental user information like personal details,social security numbers,credit card number,bank account data and personal photographs.User informations,in the hand of computer hackers make it valnerable to illegitimate use and manipulation. Hackers may even delete sensitive informations on gaining to it.Deletion or manipulation of sensitive data with intent to achive personal gain is another effects of computer haacking.A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer.Manipulation of sensitive user data is a grave consequence of hacking.
  • 7. SOURCES OF REFERENCE…  http://www.buzzle.com/articles/what-are-the-effects- of-computer-hacking.html  http://www.ehow.com/info_8431442_advantages- ethical-hacking.html  Reference book of ICT.
  • 8. CONCLUSION… Hacking fends to be a misunderstand topic,and the media likes to sensationalize,which just exacerbates this condition.Charges in terminology have been mostly ineffective-what is needed in change of mindset.Hackers are just people with innovative spirits and an in-depth knowledge of technology.
  • 10. ASSESSOR’S OBSERVATION… I feel so great with doing my my assigment with my topic,hacking.Ihave learnt many things about hacking.Hacking is a negative activity that we should not follow.So,we have to follow or use computer and internet by right way and according to Malaysia CyberLaw.