hacking
DESCRIPTION
Hacking is a cybercrimeTRANSCRIPT
![Page 1: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/1.jpg)
HACKING (CRIME) HACKING (CRIME)
If we can defeat them sitting at home……who needs to fight with
tanks and guns!!!!
If we can defeat them sitting at home……who needs to fight with
tanks and guns!!!!
Presented By
Farkhanda Kiran.
![Page 2: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/2.jpg)
INTRODUCTION
The internet is growing rapidly. It has given rise to new opportunities in every field we can
think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal
activity committed on the internet.
![Page 3: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/3.jpg)
DEFINING CYBER CRIME
Crime committed using a computer and the internet to steal data or information.
Illegal imports. Malicious programs.
![Page 4: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/4.jpg)
Cyber crime
Cybercrime is nothing but where the computer used as an object
or subject of crime..
![Page 5: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/5.jpg)
TYPES OF CYBER CRIME
• Hacking• Denial of service attack• Virus Dissemination• Computer Vandalism• Cyber Terrorism• Software Piracy
![Page 6: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/6.jpg)
![Page 7: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/7.jpg)
HACKING
• To gain illegal or unauthorized access to a file, computer, or network
![Page 8: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/8.jpg)
HISTORY
• Phase 1: early 1960s to 1970s – It was a positive term introduce by
MIT– A "hacker" was a creative
programmer who wrote elegant or clever code
– A "hack" was an especially clever piece of code
![Page 9: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/9.jpg)
HISTORY
• Phase 2: 1970s to mid 1990s Phone Phreaker or Phone Hacker
![Page 10: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/10.jpg)
HISTORY
• Phase 3: beginning with the mid 1990s
Phreaks started to migrate to computers
-Political hacking (Hacktivism) surfaced
– Denial-of-service (DoS) – Large scale theft of personal and
financial information
![Page 11: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/11.jpg)
Who is a “HACKER” ?
![Page 12: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/12.jpg)
HACKER
• who access computer system and network without authorization.
![Page 13: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/13.jpg)
Types of Hackers
![Page 14: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/14.jpg)
BLACK HAT HACKERS
![Page 15: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/15.jpg)
1. Black Hat hackers always do illegal work. They Work for black money .
2. Hack into to Bank Websites , credit card websites and stole Money from accounts in bank websites.
3. They use their knowledge for illegal purposes.
![Page 16: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/16.jpg)
White hat hackers
![Page 17: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/17.jpg)
• White hat hackers are like Ethical Hackers . They use their skills for good purposes
• They work for organizations for stop the illegal activities through black hat hackers.
![Page 18: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/18.jpg)
GREY HAT HACKERS
![Page 19: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/19.jpg)
1. Grey Hat hackers have both qualities like black hat hackers and white hat hackers .
2. They use their knowledge for bad purposes and good purposes too.
![Page 20: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/20.jpg)
Terminologies
Hackers
• Access computer system or network without authorization
• Breaks the law; can go to prison
Crackers
• Break into systems to steal or destroy data
• U.S. Department of Justice calls both hackers
Ethical hacker
• Performs most of the same activities but with owner’s
permission
![Page 21: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/21.jpg)
Hacktivism
![Page 22: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/22.jpg)
Hacktivism/Political Hacking
• The act of hacking, or breaking into computer system, for a political or socially motivated purpose.
![Page 23: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/23.jpg)
The Law: Catching and Punishing Hackers:
• 1986 Congress passed the Computer Fraud and Abuse Act (CFAA)– Covers government computers, financial
and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet
– The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems
![Page 24: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/24.jpg)
The Law: Catching and Punishing Hackers
(cont.):• A variety of methods for
catching hackers– Law enforcement agents read hacker
newsletters and participate in chat rooms undercover
– They can often track a handle by looking through newsgroup archives
– Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study
– Computer forensics is used to retrieve evidence from computers
![Page 25: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/25.jpg)
The Law: Catching and Punishing Hackers
(cont.):• Security
– Internet started with open access as a means of sharing information for research
– Attitudes about security were slow to catch up with the risks
– Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity
– Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited
![Page 26: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/26.jpg)
The Law: Catching and Punishing Hackers
(cont.):• Responsibility for Security
– Developers have a responsibility to develop with security as a goal
– Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding
– Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)
![Page 27: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/27.jpg)
Conclusion
• Hacking is a good computing skill that can be used for good or bad intention.
• Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between crackers and hackers.
• Learning skills of hacking is only for the greater good.
![Page 28: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/28.jpg)
References
• http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm
• http://whatishacking.org/• http://whatismyipaddress.com/hacking• http://dictionary.reference.com/browse/hacker?s=t• http://wiki.answers.com/Q/What_is_the_difference_between_hacking_a
nd_cracking• http://answers.yahoo.com/question/index?qid=20071206182542AA3Jz
Ny• http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-polit
ics_b_2512573.html• http://answers.yahoo.com/question/index?qid=20110801131429AAFT
ktO• http://www.cs.berkeley.edu/~bh/hacker.html• http://www.ehow.com/about_4673738_why-do-people-hack.html• http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-thing
s-to-know/• http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-tr
aining• http://www.switched.com/2011/02/24/what-to-do-email-account-hacke
d/
Thank You
![Page 29: Hacking](https://reader033.vdocument.in/reader033/viewer/2022060116/5580fd2fd8b42a9d198b4dc6/html5/thumbnails/29.jpg)
Any **Queries ?
**Ask@Your Own Risk