Upload
djkhatri
View
125
Download
0
Tags:
Embed Size (px)
Citation preview
HackingAuthorized or unauthorized attempts to bypass the security mechanisms of an information system or network.
Who is a “HACKER” ?
A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
The good guys who identify the security weakness of the system or network and inform the owner about them.
◦A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3|\| 1 h4ck3d 1n
I did not hack this page, it was like
this when I hacked in.
To make security stronger ( Ethical Hacking ).
Just for fun.
Hack other systems secretly.
Steal important information.
Destroy enemy’s computer network.
ETHICAL HACKING
This is a positive approach of hacking.
In this type of hacking company’s own
software engineers Hack into its server and
crack its password.
If the password is cracked one time nobody
can crack it again so the server is kept
secured.
Did you know ?Social networking sites like
‘FACEBOOK’,’GMAIL’,’YAHOO”
comprised of 60% of direct or
indirect hacking incidents.
The average age group of hackers
are aged between 14-24 yrs. …
Preventive
measures Install a strong anti-virus software.
Always run a anti-virus check before
you download a program or a file from
the internet.
Avoid disclosing personal details like
phone number, credit card details to
strangers.