SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
HACKING   Presented By..   Amit Kumar Pandey   MCA 4 TH  SEM
Introduction : ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Definition : ,[object Object],[object Object]
[object Object],[object Object],[object Object]
Types of Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Threats ,[object Object],[object Object],[object Object],[object Object]
Attack on Confidentially ,[object Object],[object Object],[object Object],[object Object],[object Object],source Destination Attacke r Normal information flow Intercepted information flow
Attack on Availability ,[object Object],[object Object],[object Object],[object Object],[object Object],source destination
Attack on Integrity ,[object Object],[object Object],[object Object],source Destination Attacker Normal information flow Intercepted information flow
Attack on Authenticity ,[object Object],[object Object],[object Object],[object Object],[object Object],source Destination Attacker Normal information flow Forget information
Real threats ,[object Object],[object Object],[object Object],[object Object],[object Object]
Defected website
Information Gathering ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object]
History of Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],Cond..
[object Object],[object Object],[object Object],[object Object],[object Object],Cond…
1988  first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the  first person indicted under the computer fraud. --3 years probation. --400 hours community service --fine $10,050 & cost of his supervision Cond..
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cond..
[object Object],[object Object],[object Object],[object Object]
Ethical Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cond…
[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You

Más contenido relacionado

La actualidad más candente (20)

Hackers
HackersHackers
Hackers
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
HackingHacking
Hacking
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Hacking
Hacking Hacking
Hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 

Destacado

Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Templatedloschiavo
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of HackingGOPCSOFT
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State EvaporationMorteza Sadeghi
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSMarc Jones
 
Water evaporation reduction from lakes
Water evaporation reduction from lakesWater evaporation reduction from lakes
Water evaporation reduction from lakesguestb311d8
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachAli Abbasi
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 
hacking and its types
hacking and its typeshacking and its types
hacking and its typesBharath Reddy
 

Destacado (20)

Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Template
 
Evaporation
EvaporationEvaporation
Evaporation
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of Hacking
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacking Movable Type
Hacking Movable TypeHacking Movable Type
Hacking Movable Type
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State Evaporation
 
Group 4 (evaporation)
Group 4 (evaporation)Group 4 (evaporation)
Group 4 (evaporation)
 
Science - Evaporation
Science - EvaporationScience - Evaporation
Science - Evaporation
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKS
 
Water evaporation reduction from lakes
Water evaporation reduction from lakesWater evaporation reduction from lakes
Water evaporation reduction from lakes
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation Approach
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
Evaporation 4 slides
Evaporation 4 slidesEvaporation 4 slides
Evaporation 4 slides
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Hacking
HackingHacking
Hacking
 
Evaporation
EvaporationEvaporation
Evaporation
 

Similar a HACKING HISTORY AND TYPES

Similar a HACKING HISTORY AND TYPES (20)

Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
hacking
hackinghacking
hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 

Más de Amit Pandey

Más de Amit Pandey (9)

Vsat
VsatVsat
Vsat
 
Xml
XmlXml
Xml
 
Learning
LearningLearning
Learning
 
Some Characteristics Of Dqdb
Some Characteristics Of DqdbSome Characteristics Of Dqdb
Some Characteristics Of Dqdb
 
Routing
RoutingRouting
Routing
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Edi
EdiEdi
Edi
 
Job Analysis
Job AnalysisJob Analysis
Job Analysis
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 

HACKING HISTORY AND TYPES

  • 1. HACKING Presented By.. Amit Kumar Pandey MCA 4 TH SEM
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. 1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud. --3 years probation. --400 hours community service --fine $10,050 & cost of his supervision Cond..
  • 19.
  • 20.
  • 21.
  • 22.