SlideShare ist ein Scribd-Unternehmen logo
1 von 12
WHAT IS SECURITY
 Security is the degree of resistance to, or
protection from, harm.
It is the state of being free from danger or
threat.
Difference Between Security and
Protection
Security and protection are extremely close
concepts though not same.
 Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
What is Hacking?
Hacking refers to an array of activities which are done to
intrude some one else’s personal information space so as
to use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical information for
gaining access to secured networks.
A Brief History of Hacking
• 1980s
- Cyberspace coined
-414 arrested
-Two hacker groups formed
-2600 published
• 1990s
-National Crackdown on hackers
-Kevin Mitnick arrested
-Microsoft’s NT operating system pierced
A Brief History of Hacking
• 2001
– In one of the biggest denial-of-service attack, hackers launched attacks
against eBay, Yahoo!, CNN.com., Amazon and others.
• 2007
– Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded
nearly $1 Million has been stolen in three months from 250 customer
account.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris
Overview of Hacking
 Hack
• Examine something very minutely
• The rapid crafting of new program or the making
of changes to existing, usually complicated
software
 Hacker
• The person who hacks
 Cracker
• System intruder/ destroyer
• Black hat hackers
History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
Hacker and Ethical Hacker
 Hacker
• Access computer system or network without
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Types of Hacker
 White Hat Hacker
• Good guys
• Don’t use their skill for illegal purpose
• Computer security experts and help to protect from Black
Hats.
Black Hat Hacker
• Bad guys
• Use their skill maliciously for personal gain
• Hack banks, steal credit cards and deface websites
 Grey Hat Hacker
• It is a combination of White hat n Black Hat Hackers
• Goal of grey hat hackers is to provide national security.
• A grey hat hacker may surf the Internet and hack into a
computer system for the sole purpose of notifying the
administrator that their system has a security defect, for
example. They may then offer to correct the defect for a
fee

Weitere ähnliche Inhalte

Was ist angesagt?

Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTVivekanandan M
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issueVincent Joassin
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsCareer Communications Group
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutirysefreed
 

Was ist angesagt? (20)

Hacking
HackingHacking
Hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
 
Cyber security
Cyber securityCyber security
Cyber security
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutiry
 
Hacking
HackingHacking
Hacking
 

Andere mochten auch

«Тарифна мобілізація»: уся правда про тарифи
«Тарифна мобілізація»: уся правда про тарифи«Тарифна мобілізація»: уся правда про тарифи
«Тарифна мобілізація»: уся правда про тарифиtarifna_mobilizaciya
 
ICTfkipunsri_DentiOktaviani
ICTfkipunsri_DentiOktavianiICTfkipunsri_DentiOktaviani
ICTfkipunsri_DentiOktavianidenti oktaviani
 
Презентация гостиничного комплекса "Днепр"
Презентация гостиничного комплекса "Днепр"Презентация гостиничного комплекса "Днепр"
Презентация гостиничного комплекса "Днепр"dnieper_hotel
 
Preparation Of Specimen For Microscopic Examination
Preparation Of Specimen For Microscopic ExaminationPreparation Of Specimen For Microscopic Examination
Preparation Of Specimen For Microscopic ExaminationPATEL DEEP
 
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - HelsinkiMiten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - HelsinkiIiro Lamppu
 

Andere mochten auch (6)

«Тарифна мобілізація»: уся правда про тарифи
«Тарифна мобілізація»: уся правда про тарифи«Тарифна мобілізація»: уся правда про тарифи
«Тарифна мобілізація»: уся правда про тарифи
 
ICTfkipunsri_DentiOktaviani
ICTfkipunsri_DentiOktavianiICTfkipunsri_DentiOktaviani
ICTfkipunsri_DentiOktaviani
 
ECDL
ECDLECDL
ECDL
 
Презентация гостиничного комплекса "Днепр"
Презентация гостиничного комплекса "Днепр"Презентация гостиничного комплекса "Днепр"
Презентация гостиничного комплекса "Днепр"
 
Preparation Of Specimen For Microscopic Examination
Preparation Of Specimen For Microscopic ExaminationPreparation Of Specimen For Microscopic Examination
Preparation Of Specimen For Microscopic Examination
 
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - HelsinkiMiten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
Miten big data mullistaa b2b-myynnin? SHOP & e-commerce 2017 - Helsinki
 

Ähnlich wie Hacking (1)

Ähnlich wie Hacking (1) (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
HACKING
HACKINGHACKING
HACKING
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 

Kürzlich hochgeladen

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Kürzlich hochgeladen (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Hacking (1)

  • 1.
  • 2.
  • 3. WHAT IS SECURITY  Security is the degree of resistance to, or protection from, harm. It is the state of being free from danger or threat.
  • 4. Difference Between Security and Protection Security and protection are extremely close concepts though not same.  Security measures are adopted to increase the level of protection The feeling of protection arises when one has enough security measures Security is a type of protection against external threats.
  • 5. What is Hacking? Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 6. A Brief History of Hacking • 1980s - Cyberspace coined -414 arrested -Two hacker groups formed -2600 published • 1990s -National Crackdown on hackers -Kevin Mitnick arrested -Microsoft’s NT operating system pierced
  • 7. A Brief History of Hacking • 2001 – In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others. • 2007 – Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account.
  • 8. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Mark AbeneLinus Torvalds Robert Morris
  • 9. Overview of Hacking  Hack • Examine something very minutely • The rapid crafting of new program or the making of changes to existing, usually complicated software  Hacker • The person who hacks  Cracker • System intruder/ destroyer • Black hat hackers
  • 10. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 11. Hacker and Ethical Hacker  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 12. Types of Hacker  White Hat Hacker • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats. Black Hat Hacker • Bad guys • Use their skill maliciously for personal gain • Hack banks, steal credit cards and deface websites  Grey Hat Hacker • It is a combination of White hat n Black Hat Hackers • Goal of grey hat hackers is to provide national security. • A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee