9
HACKING Present by: Mas Hafizra Hanis

Ict Hacking 3036

Embed Size (px)

Citation preview

Page 1: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 1/9

HACKING

Present by:

Mas Hafizra Hanis

Page 2: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 2/9

WHAT IS HACKING?

usually defined as the act of illegally entering a computer system, and makingunauthorized changes to the files and data contained within

In order to “hack” a system, one must first “crack” the system, hence the term

“cracker.” A cracker is an individual, or group, whose main intent is to maliciously

enter a network, by gaining illegal access, with the goal of damaging the system.Crackers are most commonly referred to as a cyber burglars or vandals

The most widely publicized form of hacking today is „criminal hacking.‟ The definitionof criminal hacking draws a clear distinction between hacking, simply for the purposeof gaining access to a system, versus the term „criminal,‟ which refers to the actual

manipulation of the information contained within the system, whether it be positive ornegative

differentiation between general hacking and criminal hacking has provided somerestitution to victims of criminal hacking attacks by providing them the option of filing

a lawsuit. However even this outcome is problematic due to the reluctance of theGovernment, large corporations, and even some individuals to admit that theirsystems have been illegally penetrated. This factor illustrates the complexity inregulating this form of criminal activity

Page 3: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 3/9

HACKING SOFTWARE

This type of software, commonly referred to as “spyware,” can be

downloaded directly any computer if adequate prevention methods arenot used to stop it. This software does everything from recording anypasswords typed to copying and recording copies of email that is sent,as well as received. Spyware also keeps a consecutive log of all

websites visited, and it even has the capabilities to allow you to specifywords or phrases for which it will record matches in email, as well as any

documents types in programs available through the computer‟s hard

drive.

It is important to be aware of these threats because they demonstrate

the value and necessity of adequate security.

Page 4: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 4/9

HOW TO TELL IF YOU‟VE BEEN HACKED? 

More indicative signals that your systemcould have been hacked are: discoveringemails in your sent items folder that were not

written nor sent by you, finding that files havebeen moved, or even disappeared, orobserving that desktop icons and toolbarsare blank or even missing

Many attacks, such as email bombs andviruses provide clear evidence of a hacker'spresence.

Page 5: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 5/9

WHAT TO DO IF YOU'VE BEEN HACKED 

The most important step to consider if you suspect yoursystem‟s security has been compromised is to shut off all

connections to the Internet. Although this temporarilydetains you from the ability to trace the PC responsible for

the attack, it does enable you to first protect yourinformation, which is probably your primary concern.

Many firewalls, Zonealarm for one, possess the ability ofmaintaining a detailed description of attempted intrusions.

reported the incident to the specific ISP.

Page 6: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 6/9

ETHICAL HACKING 

Organizations have recently began to realize that one of the best waysto evaluate the threat of intruders gaining admission into their system isto hire security professionals to attempt to do exactly as an intruderwould

In contrast with criminal hackers, ethical hackers must be completelytrustworthy. The responsibility of testing a client‟s systems security,

could privilege ethical hackers to confidential information about theclient.

The principal goal of ethical hacking is to expand the knowledge, andthought processes traditionally held by systems engineers, auditors, andsecurity officers

Page 7: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 7/9

CONCLUSION

The outcome of hacking cyberspace isneither good nor bad, positive nor negative,constructive nor despructive. It compromises

a general strategy by which to explore andmanipulate the systems of rationality bywhich these modes of assessment become

possible, function, and make sense.

Page 8: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 8/9

REFERENCE

http://www.wsu.edu/~mejia1/WhatHack.html

http://www.bama.ua.edu/~wilso098/project/sources.html

Page 9: Ict Hacking 3036

8/2/2019 Ict Hacking 3036

http://slidepdf.com/reader/full/ict-hacking-3036 9/9

THANK YOU…