SlideShare a Scribd company logo
1 of 27
Information
Technology
ADVANTAGES
DISADVANTAGES
Submitted to :-
Prof. Suman Mathur
ABHIJIT AMBRE P 1
YOGITA KUMBHAR P 43
KAUSHIK LANJEKAR P 12
VISHESH JAYSWAL P 60
Security issues in I.T
Computer viruses
Computer worms
Trojan Horses
Rootkits
Spyware
Adware
A virus is a program or piece of code that is
loaded onto your computer without your
knowledge and runs against your wishes
Reproductive capability
Spread from one computer to another
Introduced when On downloading files from the
Internet.
On opening an e-mail attachment.
On copying programs or files from any other
infected computer
WORMS
A computer worm is
a self-replicating malware
computer program.
Goal is
Worms use automated
functions within a network,
such as those in e-mails, to help spread themselves
Attempt to spread as fast and far as possible
TROJAN HORSES
Appear to be useful
Hide something that will damage the computer
Does not replicate
Often carried by a virus, worm
Definition :-
Hacking is the act of gaining access without
legal authorization to a computer or computer network.
 The term "hack" was first used by US university
computing centre staff in the mid-1960s.
 In common usage, a hacker is a person who breaks into
computers and computer networks, either for profit or
motivated by the challenge.
Types of HACKERS
WHITE HAT :-
A white hat is the hero or good guy,
especially in computing slang, where it refers to an
ethical hacker or penetration tester who focuses on
securing and protecting IT systems.
BLACK HAT :-
do only malicious thing like making Trojans
,hacking email id, username and password, credit card
numbers, bank information. They actually called
crackers ,They don't have the legal rights to do that.
they are called non ethical hackers.
GREY HAT :-
It refers to a skilled hacker who sometimes acts
illegally, though in good will, and limits their disclosure of
vulnerabilities on a need-to-know basis. They are a hybrid
between white and black hat hackers. They usually do not
hack for personal gain or have malicious intentions, but are
prepared to commit crimes during the course of their
technological exploits in order to achieve better security.
Phreaker :-
A phreaker is simply a hacker of telecommunications.
SCRIPT KIDDIE :-
A script kiddie is a non-expert who breaks
into computer systems by using pre-packaged automated
tools written by others.
the term script (i.e. a prearranged plan or set of activities)
kiddie (i.e. kid, child—an individual lacking knowledge and
experience, immature).
Neophyte :-
A neophyte or "newbie" is a term used to describe
someone who is new to hacking or phreaking and has almost
no knowledge or experience of the workings of technology,
and hacking.
WAYS OF HACKING
NetBIOS :-
NetBIOS is meant to be used on local area
networks, so machines on that network can share
information. NetBIOS can also be used across the Internet
- so a hacker can access your machine remotely.
ICMP ‘Ping’ (Internet Control Message Protocol) :-
If a computer responds to a ping, then the
hacker could then launch a more serious form of attack
against a computer.
FTP (File Transfer Protocol) :-
You may use it for file downloads from
some websites. FTP can also be used by some
hackers.FTP normally requires some form of
authentication for access to private files, or for
writing to files.
HTTP – (Hypertext Transfer Protocol) :-
HTTP hacks can only be harmful if you
are using Microsoft web server software, such
as Personal Web Server.
Cracker:
A cracker is someone who breaks into
someone else's computer system, often on a
network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security. A
cracker can be doing this for profit,
maliciously, for some altruistic purpose or
cause, or because the challenge is there
Difference between
HACKERS AND CRACKERS:
HACKER: CRACKER:
A person who enjoys exploring the
details of programmable systems and
how to stretch their capabilities, as
opposed to most users, who prefer to
learn only the minimum necessary.
A cracker is a hacker who uses their
proficiency for personal gains outside
of the law. EX: stealing data, changing
bank accounts, distributing viruses etc
Hackers can be both good and bad. Crackers do cracking basically to
disturb someones computer system.
Phone Phreaking:
Phone phreaking is the act of gaining illegal access to
resources of telecom networks for fun or malicious
activity. Before computer hacking took over, phreaking
was the dominant underground tech activity.
Types of phone phreaking:
Switch hook and tone dialer
2600 hertz
Multi frequency
Blue boxes
Computer hacking
Toll fraud
Diverters
Voice mail boxes and bridges
Cell phones
End of multi-frequency
Harden your system
Patch all your systems
Install a firewall
The prevention measures
for HACKING
Prevention measures for
MALWARES/VIRUS
Use an anti virus
Don’t download anything
from unknown sources
Always check external media
(CD/DVD/Pen drives) before running them
on your PC.
WWW.GOOGLE.COM
WWW.WIKIPEDIA.COM
It
It
It

More Related Content

What's hot

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking courseChitraKuder
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker PlagueLuke Perrin
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 

What's hot (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking course
 
Hacking
HackingHacking
Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 
Internet security
Internet securityInternet security
Internet security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

AnDevCon: Android Reverse Engineering
AnDevCon: Android Reverse EngineeringAnDevCon: Android Reverse Engineering
AnDevCon: Android Reverse EngineeringEnrique López Mañas
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingSathishkumar A
 
Avatar Na’vi Adobe Photoshop Tutorial
Avatar Na’vi Adobe Photoshop TutorialAvatar Na’vi Adobe Photoshop Tutorial
Avatar Na’vi Adobe Photoshop TutorialDeanna Inkson
 
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...Area41
 
Part 3 how to make simple tarpulin in adobe photoshop cs6
Part 3 how to make simple tarpulin in adobe photoshop cs6Part 3 how to make simple tarpulin in adobe photoshop cs6
Part 3 how to make simple tarpulin in adobe photoshop cs6bentibaldo
 
Certified Ethical Hacking Course & Training
Certified Ethical Hacking Course & Training Certified Ethical Hacking Course & Training
Certified Ethical Hacking Course & Training Ravina Pillai
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowVi Tính Hoàng Nam
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijackingleminhvuong
 
Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsJerod Brennen
 
Learning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorialLearning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorialLandice Fu
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Adobe Photoshop CS6 tutorial 2013
Adobe Photoshop CS6 tutorial 2013Adobe Photoshop CS6 tutorial 2013
Adobe Photoshop CS6 tutorial 2013Jessie Doan
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 

Viewers also liked (20)

AnDevCon: Android Reverse Engineering
AnDevCon: Android Reverse EngineeringAnDevCon: Android Reverse Engineering
AnDevCon: Android Reverse Engineering
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hacking
 
Avatar Na’vi Adobe Photoshop Tutorial
Avatar Na’vi Adobe Photoshop TutorialAvatar Na’vi Adobe Photoshop Tutorial
Avatar Na’vi Adobe Photoshop Tutorial
 
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
 
E commerce
E commerceE commerce
E commerce
 
Part 3 how to make simple tarpulin in adobe photoshop cs6
Part 3 how to make simple tarpulin in adobe photoshop cs6Part 3 how to make simple tarpulin in adobe photoshop cs6
Part 3 how to make simple tarpulin in adobe photoshop cs6
 
Certified Ethical Hacking Course & Training
Certified Ethical Hacking Course & Training Certified Ethical Hacking Course & Training
Certified Ethical Hacking Course & Training
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
 
Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile Applications
 
Learning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorialLearning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorial
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Adobe Photoshop CS6 tutorial 2013
Adobe Photoshop CS6 tutorial 2013Adobe Photoshop CS6 tutorial 2013
Adobe Photoshop CS6 tutorial 2013
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
SNMP
SNMPSNMP
SNMP
 

Similar to It

Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptxAdrianVANTOPINA
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 

Similar to It (20)

Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hacking
HackingHacking
Hacking
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 

It

  • 4. Submitted to :- Prof. Suman Mathur
  • 5. ABHIJIT AMBRE P 1 YOGITA KUMBHAR P 43 KAUSHIK LANJEKAR P 12 VISHESH JAYSWAL P 60
  • 7. Computer viruses Computer worms Trojan Horses Rootkits Spyware Adware
  • 8. A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes Reproductive capability Spread from one computer to another Introduced when On downloading files from the Internet. On opening an e-mail attachment. On copying programs or files from any other infected computer
  • 9. WORMS A computer worm is a self-replicating malware computer program. Goal is Worms use automated functions within a network, such as those in e-mails, to help spread themselves Attempt to spread as fast and far as possible
  • 10. TROJAN HORSES Appear to be useful Hide something that will damage the computer Does not replicate Often carried by a virus, worm
  • 11.
  • 12. Definition :- Hacking is the act of gaining access without legal authorization to a computer or computer network.  The term "hack" was first used by US university computing centre staff in the mid-1960s.  In common usage, a hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge.
  • 13. Types of HACKERS WHITE HAT :- A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or penetration tester who focuses on securing and protecting IT systems. BLACK HAT :- do only malicious thing like making Trojans ,hacking email id, username and password, credit card numbers, bank information. They actually called crackers ,They don't have the legal rights to do that. they are called non ethical hackers.
  • 14. GREY HAT :- It refers to a skilled hacker who sometimes acts illegally, though in good will, and limits their disclosure of vulnerabilities on a need-to-know basis. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but are prepared to commit crimes during the course of their technological exploits in order to achieve better security. Phreaker :- A phreaker is simply a hacker of telecommunications.
  • 15. SCRIPT KIDDIE :- A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature). Neophyte :- A neophyte or "newbie" is a term used to describe someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.
  • 16. WAYS OF HACKING NetBIOS :- NetBIOS is meant to be used on local area networks, so machines on that network can share information. NetBIOS can also be used across the Internet - so a hacker can access your machine remotely. ICMP ‘Ping’ (Internet Control Message Protocol) :- If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer.
  • 17. FTP (File Transfer Protocol) :- You may use it for file downloads from some websites. FTP can also be used by some hackers.FTP normally requires some form of authentication for access to private files, or for writing to files. HTTP – (Hypertext Transfer Protocol) :- HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server.
  • 18. Cracker: A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there
  • 19. Difference between HACKERS AND CRACKERS: HACKER: CRACKER: A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc Hackers can be both good and bad. Crackers do cracking basically to disturb someones computer system.
  • 20. Phone Phreaking: Phone phreaking is the act of gaining illegal access to resources of telecom networks for fun or malicious activity. Before computer hacking took over, phreaking was the dominant underground tech activity.
  • 21. Types of phone phreaking: Switch hook and tone dialer 2600 hertz Multi frequency Blue boxes Computer hacking Toll fraud Diverters Voice mail boxes and bridges Cell phones End of multi-frequency
  • 22. Harden your system Patch all your systems Install a firewall The prevention measures for HACKING
  • 23. Prevention measures for MALWARES/VIRUS Use an anti virus Don’t download anything from unknown sources Always check external media (CD/DVD/Pen drives) before running them on your PC.