SlideShare una empresa de Scribd logo
1 de 8
COMPUTER CRIME
Eldo Raju N
 The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called
Hacking.
Hacker: In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a computer
system or computer network.
Website Hacking
Network Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
 Ethical Hacking
 Website Hacking : Hacking a website means taking control from the website owner to
a person who hacks the website.
 Network Hacking : Network Hacking is generally means gathering information about
domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the
network.
 Email Hacking: Email hacking is unauthorized access to an email account or email
correspondence.
 Password Hacking : Password Hacking Password cracking is the process of recovering
secret passwords from data that has been stored in or transmitted by a computer
system
 Online Banking Hacking: Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without permission of account holder is
known as Online banking hacking.
 Computer Hacking: Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
 Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a
system and then usually patches them.
 Thrill-Seeker Hacker: Person who break into a computer system for
entertainment the reward is usually admiration of their fellow hackers
 White-Hat Hackers: The hackers who legitimately , with the knowledge of the
owners of the IT system, try to break in to find and fix vulnerable area of the
system. They are also called ethical Hackers, counter hackers or penetration
hackers.
 Black-Hat Hackers : They exploit or destroy the information they find steal
passwords, or otherwise cause harm to the computer network for some benefits
 Hacktivist : Are politically motivated hackers who use the internet to send a
political message of some kind.
Eg: Indian government sites are hacked by Pakistan hackers for political gain
 Cyber terrorists: is one who seeks to cause harm to people or destroy critical
systems or information. Possible targets of violent attacks would be air traffic
control systems and nuclear power plants, or anything that could harm the
infrastructure of a nation.
 Using Firewalls
 Using Anti Virus Software
 Restrict software installation
 Change default passwords on systems and devices
 Do not use official email ID to subscribe to public groups
 Data encryption
 Do not expose your passwords to untrusted websites
 Practice to use exact web address
 Turn off your internet connection when not in use
CONSEQUENCES OF
HACKING
 Thousands of rupees in fines
 Imprisonment
 Seizure of your computer and hardware
Hacking computer crime

Más contenido relacionado

La actualidad más candente

Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
Luke Perrin
 

La actualidad más candente (20)

Hacking
HackingHacking
Hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 

Destacado

đại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giáđại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giá
doreatha356
 
presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01
Dil Nawaz
 
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcmbáo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
freeman378
 
Steve Bagi CSM article
Steve Bagi CSM articleSteve Bagi CSM article
Steve Bagi CSM article
Steve Bagi
 

Destacado (20)

Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Sneider bolaños gómez
Sneider bolaños gómezSneider bolaños gómez
Sneider bolaños gómez
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
Intertextuality
IntertextualityIntertextuality
Intertextuality
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
đại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giáđại lý bán đồng hồ casio giảm giá
đại lý bán đồng hồ casio giảm giá
 
Eth pdf
Eth pdfEth pdf
Eth pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01presentation1-150427120409-conversion-gate01
presentation1-150427120409-conversion-gate01
 
Sistema solar
Sistema solarSistema solar
Sistema solar
 
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcmbáo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
báo giá dịch vụ giúp việc nhà chuyên nghiệp ở tphcm
 
Trailblazers - Ensuring Independence in Assessment
Trailblazers - Ensuring Independence in AssessmentTrailblazers - Ensuring Independence in Assessment
Trailblazers - Ensuring Independence in Assessment
 
Steve Bagi CSM article
Steve Bagi CSM articleSteve Bagi CSM article
Steve Bagi CSM article
 
C# Desktop. Занятие 01.
C# Desktop. Занятие 01.C# Desktop. Занятие 01.
C# Desktop. Занятие 01.
 
JavaScript Базовый. Занятие 02.
JavaScript Базовый. Занятие 02.JavaScript Базовый. Занятие 02.
JavaScript Базовый. Занятие 02.
 

Similar a Hacking computer crime

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Similar a Hacking computer crime (20)

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
HACKING
HACKINGHACKING
HACKING
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking
Hacking Hacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 

Último

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Último (20)

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 

Hacking computer crime

  • 2.  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. Hacker: In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
  • 3. Website Hacking Network Hacking Email Hacking Password Hacking Online Banking Hacking Computer Hacking  Ethical Hacking
  • 4.  Website Hacking : Hacking a website means taking control from the website owner to a person who hacks the website.  Network Hacking : Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.  Email Hacking: Email hacking is unauthorized access to an email account or email correspondence.  Password Hacking : Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system  Online Banking Hacking: Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  Computer Hacking: Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  Ethical Hacking : Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 5.  Thrill-Seeker Hacker: Person who break into a computer system for entertainment the reward is usually admiration of their fellow hackers  White-Hat Hackers: The hackers who legitimately , with the knowledge of the owners of the IT system, try to break in to find and fix vulnerable area of the system. They are also called ethical Hackers, counter hackers or penetration hackers.  Black-Hat Hackers : They exploit or destroy the information they find steal passwords, or otherwise cause harm to the computer network for some benefits  Hacktivist : Are politically motivated hackers who use the internet to send a political message of some kind. Eg: Indian government sites are hacked by Pakistan hackers for political gain  Cyber terrorists: is one who seeks to cause harm to people or destroy critical systems or information. Possible targets of violent attacks would be air traffic control systems and nuclear power plants, or anything that could harm the infrastructure of a nation.
  • 6.  Using Firewalls  Using Anti Virus Software  Restrict software installation  Change default passwords on systems and devices  Do not use official email ID to subscribe to public groups  Data encryption  Do not expose your passwords to untrusted websites  Practice to use exact web address  Turn off your internet connection when not in use
  • 7. CONSEQUENCES OF HACKING  Thousands of rupees in fines  Imprisonment  Seizure of your computer and hardware