3. WHAT IS SECURITY
Security is the degree of resistance to, or
protection from, harm.
It is the state of being free from danger or
threat.
4. Difference Between Security and
Protection
Security and protection are extremely close
concepts though not same.
Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
5. What is Hacking?
Hacking refers to an array of activities which are done to
intrude some one else’s personal information space so as
to use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical information for
gaining access to secured networks.
6. A Brief History of Hacking
• 1980s
- Cyberspace coined
-414 arrested
-Two hacker groups formed
-2600 published
• 1990s
-National Crackdown on hackers
-Kevin Mitnick arrested
-Microsoft’s NT operating system pierced
7. A Brief History of Hacking
• 2001
– In one of the biggest denial-of-service attack, hackers launched attacks
against eBay, Yahoo!, CNN.com., Amazon and others.
• 2007
– Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded
nearly $1 Million has been stolen in three months from 250 customer
account.
8. Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris
9. Overview of Hacking
Hack
• Examine something very minutely
• The rapid crafting of new program or the making
of changes to existing, usually complicated
software
Hacker
• The person who hacks
Cracker
• System intruder/ destroyer
• Black hat hackers
10. History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
11. Hacker and Ethical Hacker
Hacker
• Access computer system or network without
authorization
• Breaks the law
Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
12. Types of Hacker
White Hat Hacker
• Good guys
• Don’t use their skill for illegal purpose
• Computer security experts and help to protect from Black
Hats.
Black Hat Hacker
• Bad guys
• Use their skill maliciously for personal gain
• Hack banks, steal credit cards and deface websites
Grey Hat Hacker
• It is a combination of White hat n Black Hat Hackers
• Goal of grey hat hackers is to provide national security.
• A grey hat hacker may surf the Internet and hack into a
computer system for the sole purpose of notifying the
administrator that their system has a security defect, for
example. They may then offer to correct the defect for a
fee