SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Pranav patade
Hacking
Advantages
Keep us alert
about our safety
Can be used to
recover lost
information
where the
computer
password has
been lost
Disadvantages Criminal can use
it & harm privacy
Although hacking is most often associated in
the popular consciousness with one code
breaker breaking into a computer to steal data
or wreak havoc, the word is used in a variety of
senses. Within tech communities, the word
often refers to "hacking together" a quick
program to solve a problem creatively. hacking
someone account is disrespecting some ones
privacy.
What is hacking?
Hackers do what they do using a variety of
methods. They're usually adept at working with
computers, which makes them good at finding
security vulnerabilities. Another way that
hackers get data that is seldom discussed is
called "social engineering." Social engineering is
a private investigator-like way of getting data;
you pose as someone you're not on the phone or
in an email to get the information you need.
How is hacking done?
Not all hackers are bad. Many work for good in
a variety of ways. "White hat" hackers are
hackers that work to either expose
vulnerabilities in computer systems so they can
be repaired or exploit vulnerabilities in
organizations they dislike as a form of activism.
Although hacking really is isn't as glamorous as
it is in the movies, the reality is a lot more
interesting. There's clearly more to it than lone
code breakers breaking into government
computer systems overnight.
Are all hackers bad?
1. White hat hackers -
source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29
Struan Robertson, legal director at Pinsent Masons LLP, and editor of
OUT-LAW.com, says "Broadly speaking, if the access to a system is
authorized, the hacking is ethical and legal. If it isn't, there's an
offence under the Computer Misuse Act. The unauthorized access
offence covers everything from guessing the password, to accessing
someone's webmail account, to cracking the security of a bank. The
maximum penalty for unauthorized access to a computer is two years
in prison and a fine. There are higher penalties – up to 10 years in
prison – when the hacker also modifies data". Unauthorized access
even to expose vulnerabilities for the benefit of many is not legal, says
Robertson. "There's no defense in our hacking laws that your behavior
is for the greater good. Even if it's what you believe."
Legal hackers hacking with good intention
not have intention harm any ones privacy
"black hat" hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
Black hat hackers form the stereotypical, illegal hacking groups often
portrayed in popular culture, and are "the epitome of all that the public
fears in a computer criminal". Black hat hackers break into secure networks
to destroy, modify, or steal data; or to make the network unusable for those
who are authorized to use the network. Black hat hackers are also referred
to as the "crackers" within the security industry and by modern
programmers. Crackers keep the awareness of the vulnerabilities to
themselves and do not notify the general public or the manufacturer for
patches to be applied. Individual freedom and accessibility is promoted over
privacy and security. Once they have gained control over a system, they
may apply patches or fixes to the system only to keep their reigning control.
Richard Stallman invented the definition to express the maliciousness of a
criminal hacker versus a white hat hacker who performs hacking duties to
identify places to repair.
2. Black hat hackers -
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Grey hat hacker lies between a black hat and a white
hat hacker. A grey hat hacker may surf the Internet and
hack into a computer system for the sole purpose of
notifying the administrator that their system has a
security defect, for example. They may then offer to
correct the defect for a fee. Grey hat hackers sometimes
find the defect of a system and publish the facts to the
world instead of a group of people. Even though grey
hat hackers may not necessarily perform hacking for
their personal gain, unauthorized access to a system
can be considered illegal and unethical.
3. Grey hat hackers
Just like a golden middle stage between white and
black hat hackers
Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
 Elite hacker –
social status among hackers, elite is used to describe the most skilled. Newly discovered
exploits circulate among these hackers. Elite groups such as Masters of Deception
conferred a kind of credibility on their members.
 Script kiddies -
script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into
computer systems by using automated tools written by others (usually by other black hat
hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid,
child—an individual lacking knowledge and experience, immature),usually with little
understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is
someone who is new to hacking or preaching and has almost no knowledge or experience
of the workings of technology and hacking.
 Blue hat –
blue hat hacker is someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft
also uses the term Blue Hat to represent a series of security briefing events. HacktivistA
hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or
political message.Hacktivism can be divided into two main groups:Cyberterrorism —
Activities involving website defacement or denial-of-service attacks; and,Freedom of
information — Making information that is not public, or is public in non-machine-
readable formats, accessible to the public.
Types of hacking
progarmmes
Trojan
horses
A Trojan horse is a
program that seems to
be doing one thing but
is actually doing
another. It can be used
to set up a back door in
a computer system,
enabling the intruder to
gain access later. (The
name refers to the horse
from the Trojan War,
with the conceptually
similar function of
deceiving defenders into
bringing an intruder
into a protected area.)
Computer
virus
A virus is a self-
replicating program
that spreads by
inserting copies of itself
into other executable
code or documents. By
doing this, it behaves
similarly to a biological
virus, which spreads by
inserting itself into
living cells. While some
viruses are harmless or
mere hoaxes, most are
considered malicious.
Computer
worm
Like a virus, a worm is
also a self-replicating
program. It differs
from a virus in that
(a.) it propagates
through computer
networks without
user intervention; and
(b.) does not need to
attach itself to an
existing program.
Nonetheless, many
people use the terms
"virus" and "worm"
interchangeably to
describe any self-
propagating program.
1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy—
are very popular with hackers.
2) Helba from the .hack manga and anime series
for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
Books related with hacking -
Films
1) Antitrust
2) Cypher
3) Eagle Eye
4)Enemy of the State
5)Firewall
6)Girl With The Dragon
7)Tattoo
8)Hackers
9)LiveFree or Die Hard
10)The Matrix series
Etc.
Thank you
All references are from >

Weitere ähnliche Inhalte

Was ist angesagt?

PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

Was ist angesagt? (20)

HACKING
HACKINGHACKING
HACKING
 
HACKING
HACKINGHACKING
HACKING
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Ähnlich wie Hacking

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack SlideCikgu Syam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptxAlefya1
 

Ähnlich wie Hacking (20)

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Hackers
HackersHackers
Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
hacking
hackinghacking
hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 

Kürzlich hochgeladen

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Kürzlich hochgeladen (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Hacking

  • 2. Hacking Advantages Keep us alert about our safety Can be used to recover lost information where the computer password has been lost Disadvantages Criminal can use it & harm privacy
  • 3. Although hacking is most often associated in the popular consciousness with one code breaker breaking into a computer to steal data or wreak havoc, the word is used in a variety of senses. Within tech communities, the word often refers to "hacking together" a quick program to solve a problem creatively. hacking someone account is disrespecting some ones privacy. What is hacking?
  • 4. Hackers do what they do using a variety of methods. They're usually adept at working with computers, which makes them good at finding security vulnerabilities. Another way that hackers get data that is seldom discussed is called "social engineering." Social engineering is a private investigator-like way of getting data; you pose as someone you're not on the phone or in an email to get the information you need. How is hacking done?
  • 5. Not all hackers are bad. Many work for good in a variety of ways. "White hat" hackers are hackers that work to either expose vulnerabilities in computer systems so they can be repaired or exploit vulnerabilities in organizations they dislike as a form of activism. Although hacking really is isn't as glamorous as it is in the movies, the reality is a lot more interesting. There's clearly more to it than lone code breakers breaking into government computer systems overnight. Are all hackers bad?
  • 6.
  • 7. 1. White hat hackers - source - http://en.wikipedia.org/wiki/White_hat_%28computer_security%29 Struan Robertson, legal director at Pinsent Masons LLP, and editor of OUT-LAW.com, says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offence under the Computer Misuse Act. The unauthorized access offence covers everything from guessing the password, to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe." Legal hackers hacking with good intention not have intention harm any ones privacy
  • 8. "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair. 2. Black hat hackers - Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 9. Grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical. 3. Grey hat hackers Just like a golden middle stage between white and black hat hackers Source- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 10.  Elite hacker – social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.  Script kiddies - script kiddies (also known as a skid or skid die) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddies (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.NeophyteA neophyte ("newbie", or "knob") is someone who is new to hacking or preaching and has almost no knowledge or experience of the workings of technology and hacking.  Blue hat – blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term Blue Hat to represent a series of security briefing events. HacktivistA hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.Hacktivism can be divided into two main groups:Cyberterrorism — Activities involving website defacement or denial-of-service attacks; and,Freedom of information — Making information that is not public, or is public in non-machine- readable formats, accessible to the public.
  • 12. Trojan horses A Trojan horse is a program that seems to be doing one thing but is actually doing another. It can be used to set up a back door in a computer system, enabling the intruder to gain access later. (The name refers to the horse from the Trojan War, with the conceptually similar function of deceiving defenders into bringing an intruder into a protected area.) Computer virus A virus is a self- replicating program that spreads by inserting copies of itself into other executable code or documents. By doing this, it behaves similarly to a biological virus, which spreads by inserting itself into living cells. While some viruses are harmless or mere hoaxes, most are considered malicious. Computer worm Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self- propagating program.
  • 13. 1) The cyberpunk novels of William Gibson—especially the Sprawl trilogy— are very popular with hackers. 2) Helba from the .hack manga and anime series for more books > http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 Books related with hacking -
  • 14. Films 1) Antitrust 2) Cypher 3) Eagle Eye 4)Enemy of the State 5)Firewall 6)Girl With The Dragon 7)Tattoo 8)Hackers 9)LiveFree or Die Hard 10)The Matrix series Etc.