2. HACKER
• Hacker is a person who breaks into some ones computers or
computer networks either for the purpose of profit, fun or a
motivated challenge is called a hacker.
3. TYPES OF HACKERS
Grey Hat Hackers
White Hat Hackers
Black Hat Hacker
4. WHITE HAT HACKERS
• White hat hackers are
the ones who do not
use their skills
for harming others or
for illegal purposes.
• These are often
called security experts
and are considered as
good guys.
5. BLACK HAT HACKERS
• Black hat hackers often
called as Crackers are the
ones who use their skills
for illegal purposes such as
Credit card stealing,
Hacking a bank etc.
6. GREY HAT HACKERS
• Grey hat hackers are a
hybrid between White hat
hackers and black hat
hackers i.e. They some
times act as white hat and
some times black hat and
some times not.
7. ETHICAL HACKING
It is use of programming
skills to determine
vulnerabilities in
computer system.
It is also known as
the intrusion testing
or penetration testing.
9. WEBSITE HACKING
• Hacking a website
means taking
unauthorized
control over or web
server and its
associated software
such as database
and other interfaces.
10. EMAIL HACKING
• It includes getting
unauthorized
access on an email
account and using
it without taking
the consent of its
owner.
11. PASSWORD HACKING
• This is the process
of recovering
secret passwords
from data that has
been stored in or
transmitted by a
computer system.
12. COMPUTER HACKING
• This is the process of
stealing computer ID
and password by
applying hacking
methods and getting
unauthorized access
to a computer
system.
13. ADVANTAGES OF
HACKING
• To recover lost
information, especially in
case you lost your
password.
• To put adequate
preventative measures in
place to prevent security
breaches.
• To have a computer system
that prevents malicious
hackers from gaining
access.
14. DISADVANTAGES OF
HACKING
• Massive security breach.
• Unauthorized system
access on private
information.
• Privacy violation.
• Hampering system
operation.
• Malicious attack on the
system.
15. PURPOSE OF HACKING
• Just for fun
• Show-off
• Steal important information
• Damaging the system
• Hampering privacy
• Money extortion
• System security testing
• To break policy compliance
16. WHAT DO YOU DO
AFTER BEING HACKED
Shut down the system OR
Turn off the system.
Separate the Systems from
networks.
Restore the system with the
backup OR Re-Install all
programs.
Then , Connect the system
to the Networks.