SlideShare una empresa de Scribd logo
1 de 11
hacking

By conor stellman
Virus
• A piece of code that is capable of copying
  itself and typically has a detrimental effect,
  such as corrupting the system or destroying
  data
Code hacking
• In common usage, a hacker is a stereotypical
  person who breaks into computers and
  computer networks, either for profit or
  motivated by the challenge.
Places hacked
• AT&T Corp., Griffith Air Force Base, NASA, and
  the Korean Atomic Research Institute all fell
  prey to hackers in the 1990s
•
•
•
    Types of Hacking
    Hacking Types
                            Types of hacking
•   1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs
    include stealing passwords (which hackers then use or sell), performing industrial espionage, causing
    harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and
    observant employees who guard their passwords and PCs can thwart many of these security breeches.
•   2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that
    outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are
    most often connected by well-meaning but ignorant employees.
•   3) Back Doors - Hackers can gain access to a network by exploiting back doors 'administrative
    shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of
    computerized searchers (bots), hackers can probably find any weakness in your network.
Types of hacking continued
•   4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach
    themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut
    down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
•   5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-
    ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus,
    password gobbler, or remote-control SW that gives the hacker control of the PC.
•
    6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal
    access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or
    Transmission Control Protocol, TCP, packets).
•   Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult
    to block because it uses multiple, changing, source IP addresses.
•   7) Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking I your network?
•   Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.
•   Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW
    (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
•   Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez,
    which they launch.
•   Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels
    slighted, exploited, ripped off, or unloved.
•   8) Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can
    happen through simple eavesdropping or something more sinister.
ANONYMOUS
• Attempt to hack Facebook
• Successfully hacked facebook and other sites
Virus security
• MacAfee
• Norton
• ADT
video
• http://www.youtube.com/watch?v=_B-tppLBwY8&
summary
• Hacking is a crime that effect computers
  everywhere
• The virus is a piece of code that is capable of
  copying itself and typically has a detrimental
  effect, such as corrupting the system or
  destroying data
The end

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Hacking
HackingHacking
Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Destacado

Invest search
Invest searchInvest search
Invest searchpaniker
 
Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112PachangasyChangos
 
Estudio sobre la actividad exportadora de los arquitectos españoles
Estudio sobre la actividad exportadora de los arquitectos españolesEstudio sobre la actividad exportadora de los arquitectos españoles
Estudio sobre la actividad exportadora de los arquitectos españolesGORKA IRIBAR
 
Dwyer Flow Meters
Dwyer Flow MetersDwyer Flow Meters
Dwyer Flow MetersSHORTBUS101
 
Free UK UFO National Archives Documents
Free UK UFO National Archives DocumentsFree UK UFO National Archives Documents
Free UK UFO National Archives Documentsalienuforesearch
 
Overview of Azure and Cloud Computing
Overview of Azure and Cloud ComputingOverview of Azure and Cloud Computing
Overview of Azure and Cloud ComputingAbhishek Sur
 
BLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vidaBLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vidaJoanna Ferrero Socias
 
Estudio emprendedores colombianos
Estudio emprendedores colombianosEstudio emprendedores colombianos
Estudio emprendedores colombianosMarketing News
 
Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1muslimehelfen
 
Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180Claudia_Ruiz_Sanchez
 
Sisare,Servicios Informáticos
Sisare,Servicios InformáticosSisare,Servicios Informáticos
Sisare,Servicios InformáticosSisare
 
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 201513vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015JKAWFMEXICO
 
Some Insights on Startups - a founders journey
Some Insights on Startups - a founders journeySome Insights on Startups - a founders journey
Some Insights on Startups - a founders journeyRoger L. Basler de Roca
 
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...Jacinto Llorca
 
O amor não é um jogo de criança krishnananda
O amor não é um jogo de criança krishnanandaO amor não é um jogo de criança krishnananda
O amor não é um jogo de criança krishnanandaggmota
 
Crowdfunding per la radio: analisi e casi di studio
Crowdfunding per la radio: analisi e casi di studioCrowdfunding per la radio: analisi e casi di studio
Crowdfunding per la radio: analisi e casi di studioTiziano Bonini
 
Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2Independent
 
Analisis experiencias educ_japon
Analisis experiencias educ_japonAnalisis experiencias educ_japon
Analisis experiencias educ_japonWuj Chixot
 

Destacado (20)

Invest search
Invest searchInvest search
Invest search
 
Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112
 
Estudio sobre la actividad exportadora de los arquitectos españoles
Estudio sobre la actividad exportadora de los arquitectos españolesEstudio sobre la actividad exportadora de los arquitectos españoles
Estudio sobre la actividad exportadora de los arquitectos españoles
 
Dwyer Flow Meters
Dwyer Flow MetersDwyer Flow Meters
Dwyer Flow Meters
 
Free UK UFO National Archives Documents
Free UK UFO National Archives DocumentsFree UK UFO National Archives Documents
Free UK UFO National Archives Documents
 
Overview of Azure and Cloud Computing
Overview of Azure and Cloud ComputingOverview of Azure and Cloud Computing
Overview of Azure and Cloud Computing
 
BLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vidaBLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vida
 
Estudio emprendedores colombianos
Estudio emprendedores colombianosEstudio emprendedores colombianos
Estudio emprendedores colombianos
 
Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1
 
Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180
 
Sisare,Servicios Informáticos
Sisare,Servicios InformáticosSisare,Servicios Informáticos
Sisare,Servicios Informáticos
 
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 201513vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
 
Some Insights on Startups - a founders journey
Some Insights on Startups - a founders journeySome Insights on Startups - a founders journey
Some Insights on Startups - a founders journey
 
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
 
Cristian lopez
Cristian lopezCristian lopez
Cristian lopez
 
O amor não é um jogo de criança krishnananda
O amor não é um jogo de criança krishnanandaO amor não é um jogo de criança krishnananda
O amor não é um jogo de criança krishnananda
 
Crowdfunding per la radio: analisi e casi di studio
Crowdfunding per la radio: analisi e casi di studioCrowdfunding per la radio: analisi e casi di studio
Crowdfunding per la radio: analisi e casi di studio
 
Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2
 
Fichas
FichasFichas
Fichas
 
Analisis experiencias educ_japon
Analisis experiencias educ_japonAnalisis experiencias educ_japon
Analisis experiencias educ_japon
 

Similar a Hacking

building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 

Similar a Hacking (20)

Hacking
HackingHacking
Hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 

Más de powerpointking1 (9)

Explosives
ExplosivesExplosives
Explosives
 
Zodiac
ZodiacZodiac
Zodiac
 
Warren court
Warren courtWarren court
Warren court
 
Presidental candidates and thier beliefs
Presidental candidates and thier beliefsPresidental candidates and thier beliefs
Presidental candidates and thier beliefs
 
Juvinile cases
Juvinile casesJuvinile cases
Juvinile cases
 
Area 51 and roswell
Area 51 and roswellArea 51 and roswell
Area 51 and roswell
 
Blood
BloodBlood
Blood
 
Afis
AfisAfis
Afis
 
Eastern state
Eastern stateEastern state
Eastern state
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Hacking

  • 2. Virus • A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  • 3. Code hacking • In common usage, a hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge.
  • 4. Places hacked • AT&T Corp., Griffith Air Force Base, NASA, and the Korean Atomic Research Institute all fell prey to hackers in the 1990s •
  • 5. • • Types of Hacking Hacking Types Types of hacking • 1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breeches. • 2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees. • 3) Back Doors - Hackers can gain access to a network by exploiting back doors 'administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
  • 6. Types of hacking continued • 4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail. • 5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break- ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC. • 6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets). • Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. • 7) Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking I your network? • Anarchists are people who just like to break stuff. They usually exploit any target of opportunity. • Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit. • Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch. • Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved. • 8) Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.
  • 7. ANONYMOUS • Attempt to hack Facebook • Successfully hacked facebook and other sites
  • 10. summary • Hacking is a crime that effect computers everywhere • The virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data