SlideShare a Scribd company logo
1 of 23
Name :- Smit Shah -140410109096
T.Y Electrical 2 Sem 5
Subject:-CYBER SECURITY
Topic :-
1
Contents :
Meaning of Hacking.
Why do people Hack??
Types of Hacking.
Types of Hackers.
Conclusion.
2
HACKING??
The Process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources for the purpose of help or
secure system is called Hacking.
Hacking is technique in which,
any one can access any one’s
computer without his permission.
3
Why do people hack ?
 To make security stronger ( Ethical Hacking ).
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network.
4
Types Of Hacking :
Website Hacking.
Email Hacking.
Network Hacking.
Password Hacking.
Online Banking Hacking.
Computer Hacking.
5
Website Hacking:
 Hacking a website means taking control from the
website owner to a person who hacks the website.
 The hacker will get the username and password and
the hacker will use that website for any purpose
which may sometimes to destroy some valuable
information database.
6
Email Hacking :
 Email hacking is illicit access to an email account or email
correspondence.
 Ways of Email Hacking:
• Personal Information.
• Social Hacking.
• Phishing/ Hacking Software.
• Trojan Virus etc.
 Email may be protected by methods such as a strong
password, encryption of the contents or a digital signature.
An email disclaimer may be used to warn unauthorized readers
but these are thought to be ineffective.
7
Network Hacking:
 Network Hacking is generally means gathering information
about domain by using tools like Telnet, NslookUP, Ping,
Tracert, Netstat, etc… over the network.
 It also include OS Fingerprinting, Port Scanning, Port Surfing
using various Tools.
 These are the three most common methods of hacking
a wireless network:
• Sniffing
• Spoofing
• Encryption Cracking
8
Password Hacking:
 Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password.
 Most passwords can be cracked by using following techniques:
• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
9
Online banking Hacking:
 Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as
Online banking hacking.
 A bank account can be accessed in many ways. When someone
gets access to your account, that person can take all your funds
without your knowledge.
Here are five simple tips that will help Protect Your Online Accounts:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks 10
Computer Hacking:
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
 People can gain complete access to your computer
from any where in the world if your computer is
turned on, unprotected, and has an internet
connection. What they do, is up to them.
 Remote desktop connection technique.
11
Types of Hackers
12
White-hat Hackers :
The good guys who identify the security
weakness of the system or network and inform
the owner about them.
13
Black-hat Hackers:
A black hat is the villain or bad guy,
who crash into victim’s security to steal
information and destroy the victims
security network.
Also known as ‘cracker’.
14
Grey hat Hackers:
A Grey hat, in the hacking community,
refers to a skilled hacker who is somewhere
in between white and black hat hackers.
15
Language of hackers:
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x 16
Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n
I did not hack this page, it was like this
when I hacked in.
17
World Famous hackers:
 Stephen Wozniac
 Tsutomu Shimomura
18
Kevin Mitnick
Kevin Poulsen
19
Random Fact !!!!
The average age group of hackers are
aged between 14-24 yrs.…
20
Preventive measures :
Install a strong anti-virus
Always run a anti-virus check before you
download a program or a file from the internet.
Avoid disclosing personal details like phone
number, credit card details to strangers.
21
Conclusion:
 Proper ethical hackers should be employed.
 Do not expose your passwords to untrusted sites.
 Practice using exact web address.
 Close your internet while not in use.
22
THANK YOU
23

More Related Content

What's hot

What's hot (18)

Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacker
HackerHacker
Hacker
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Hacking
HackingHacking
Hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 

Viewers also liked

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)Eric D. Schabell
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Open shift enterprise 3.1 paas on kubernetes
Open shift enterprise 3.1   paas on kubernetesOpen shift enterprise 3.1   paas on kubernetes
Open shift enterprise 3.1 paas on kubernetesSamuel Terburg
 
Build a PaaS with OpenShift Origin
Build a PaaS with OpenShift OriginBuild a PaaS with OpenShift Origin
Build a PaaS with OpenShift OriginSteven Pousty
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Etsuji Nakai
 
Achieving CI/CD with Kubernetes
Achieving CI/CD with KubernetesAchieving CI/CD with Kubernetes
Achieving CI/CD with KubernetesRamit Surana
 
OpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetesOpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetesSamuel Terburg
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to KubernetesImesh Gunaratne
 
Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.Henryk Konsek
 
fabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShiftfabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShiftroland.huss
 

Viewers also liked (14)

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Open shift enterprise 3.1 paas on kubernetes
Open shift enterprise 3.1   paas on kubernetesOpen shift enterprise 3.1   paas on kubernetes
Open shift enterprise 3.1 paas on kubernetes
 
Introducing Akka
Introducing AkkaIntroducing Akka
Introducing Akka
 
Build a PaaS with OpenShift Origin
Build a PaaS with OpenShift OriginBuild a PaaS with OpenShift Origin
Build a PaaS with OpenShift Origin
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
 
Achieving CI/CD with Kubernetes
Achieving CI/CD with KubernetesAchieving CI/CD with Kubernetes
Achieving CI/CD with Kubernetes
 
OpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetesOpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetes
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to Kubernetes
 
Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.
 
fabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShiftfabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShift
 

Similar to Hacking & Attack vector

Similar to Hacking & Attack vector (20)

Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 

More from Smit Shah

Flow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coilFlow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coilSmit Shah
 
Line to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power SystemLine to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power SystemSmit Shah
 
Finite difference method for charge calculation
Finite difference method for charge calculationFinite difference method for charge calculation
Finite difference method for charge calculationSmit Shah
 
Parallel Inverter
Parallel InverterParallel Inverter
Parallel InverterSmit Shah
 
Dry Type Transformer
Dry  Type TransformerDry  Type Transformer
Dry Type TransformerSmit Shah
 
Half wave control rectifier with RL load
Half wave control rectifier with RL loadHalf wave control rectifier with RL load
Half wave control rectifier with RL loadSmit Shah
 
Pipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorPipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorSmit Shah
 
AC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmissionAC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmissionSmit Shah
 
Lap winding for AC machine
Lap winding for AC machineLap winding for AC machine
Lap winding for AC machineSmit Shah
 
Block Reduction Method
Block Reduction MethodBlock Reduction Method
Block Reduction MethodSmit Shah
 
Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal..    Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal.. Smit Shah
 
Divergence Theorem & Maxwell’s First Equation
Divergence  Theorem & Maxwell’s  First EquationDivergence  Theorem & Maxwell’s  First Equation
Divergence Theorem & Maxwell’s First EquationSmit Shah
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSmit Shah
 
Parallel Adder and Subtractor
Parallel Adder and SubtractorParallel Adder and Subtractor
Parallel Adder and SubtractorSmit Shah
 
Type of Single phase induction Motor
Type of Single phase induction MotorType of Single phase induction Motor
Type of Single phase induction MotorSmit Shah
 
Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity Smit Shah
 
Application of different types of dc generator and dc motor
Application of different types of dc generator and dc motorApplication of different types of dc generator and dc motor
Application of different types of dc generator and dc motorSmit Shah
 
Initial Conditions
Initial ConditionsInitial Conditions
Initial ConditionsSmit Shah
 
Laplace Transform And Its Applications
Laplace Transform And Its ApplicationsLaplace Transform And Its Applications
Laplace Transform And Its ApplicationsSmit Shah
 
Transistor Configuration
Transistor Configuration Transistor Configuration
Transistor Configuration Smit Shah
 

More from Smit Shah (20)

Flow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coilFlow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coil
 
Line to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power SystemLine to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power System
 
Finite difference method for charge calculation
Finite difference method for charge calculationFinite difference method for charge calculation
Finite difference method for charge calculation
 
Parallel Inverter
Parallel InverterParallel Inverter
Parallel Inverter
 
Dry Type Transformer
Dry  Type TransformerDry  Type Transformer
Dry Type Transformer
 
Half wave control rectifier with RL load
Half wave control rectifier with RL loadHalf wave control rectifier with RL load
Half wave control rectifier with RL load
 
Pipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorPipeline & Nonpipeline Processor
Pipeline & Nonpipeline Processor
 
AC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmissionAC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmission
 
Lap winding for AC machine
Lap winding for AC machineLap winding for AC machine
Lap winding for AC machine
 
Block Reduction Method
Block Reduction MethodBlock Reduction Method
Block Reduction Method
 
Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal..    Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal..
 
Divergence Theorem & Maxwell’s First Equation
Divergence  Theorem & Maxwell’s  First EquationDivergence  Theorem & Maxwell’s  First Equation
Divergence Theorem & Maxwell’s First Equation
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar Distillation
 
Parallel Adder and Subtractor
Parallel Adder and SubtractorParallel Adder and Subtractor
Parallel Adder and Subtractor
 
Type of Single phase induction Motor
Type of Single phase induction MotorType of Single phase induction Motor
Type of Single phase induction Motor
 
Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity
 
Application of different types of dc generator and dc motor
Application of different types of dc generator and dc motorApplication of different types of dc generator and dc motor
Application of different types of dc generator and dc motor
 
Initial Conditions
Initial ConditionsInitial Conditions
Initial Conditions
 
Laplace Transform And Its Applications
Laplace Transform And Its ApplicationsLaplace Transform And Its Applications
Laplace Transform And Its Applications
 
Transistor Configuration
Transistor Configuration Transistor Configuration
Transistor Configuration
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

Hacking & Attack vector

  • 1. Name :- Smit Shah -140410109096 T.Y Electrical 2 Sem 5 Subject:-CYBER SECURITY Topic :- 1
  • 2. Contents : Meaning of Hacking. Why do people Hack?? Types of Hacking. Types of Hackers. Conclusion. 2
  • 3. HACKING?? The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking. Hacking is technique in which, any one can access any one’s computer without his permission. 3
  • 4. Why do people hack ?  To make security stronger ( Ethical Hacking ).  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network. 4
  • 5. Types Of Hacking : Website Hacking. Email Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking. 5
  • 6. Website Hacking:  Hacking a website means taking control from the website owner to a person who hacks the website.  The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database. 6
  • 7. Email Hacking :  Email hacking is illicit access to an email account or email correspondence.  Ways of Email Hacking: • Personal Information. • Social Hacking. • Phishing/ Hacking Software. • Trojan Virus etc.  Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective. 7
  • 8. Network Hacking:  Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.  It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.  These are the three most common methods of hacking a wireless network: • Sniffing • Spoofing • Encryption Cracking 8
  • 9. Password Hacking:  Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.  Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing 9
  • 10. Online banking Hacking:  Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge. Here are five simple tips that will help Protect Your Online Accounts: • Use Strong Password • Protect your Computer • Keep an eye on running processes • Download with care • Be careful when using unprotected public networks 10
  • 11. Computer Hacking:  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.  Remote desktop connection technique. 11
  • 13. White-hat Hackers : The good guys who identify the security weakness of the system or network and inform the owner about them. 13
  • 14. Black-hat Hackers: A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’. 14
  • 15. Grey hat Hackers: A Grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers. 15
  • 16. Language of hackers: 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x 16
  • 17. Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in. 17
  • 18. World Famous hackers:  Stephen Wozniac  Tsutomu Shimomura 18
  • 20. Random Fact !!!! The average age group of hackers are aged between 14-24 yrs.… 20
  • 21. Preventive measures : Install a strong anti-virus Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers. 21
  • 22. Conclusion:  Proper ethical hackers should be employed.  Do not expose your passwords to untrusted sites.  Practice using exact web address.  Close your internet while not in use. 22