SlideShare una empresa de Scribd logo
1 de 19
GANDHINAGAR INSTITUTE OF
TECHNOLOGY
ACTIVE LEARNING ASSIGNMENT
ON
“HACKING”
CYBER SECURITY [2150002]
PREPARED BY:- UPADHYAY AYUSH (150123119053)
HACKING…
What is hacking?
 Hacking is the gaining of access(wanted or unwanted) to a computer
and viewing, copying, or creating data(leaving a trace) without the
intention of destroying data or maliciously harming the computer.
 Hacking is a broad term used to describe many complex activities
wherein the end goal is typically to obtain access to a computer
system's servers, database(s), or stored files. This access may be any
combination or desired or undesired, and legal or illegal.
Hacker
 A hacker is any person engaged in hacking.
 Person who gains authorized/unauthorized access to a computer
WITHOUT the intention of causing damage.
 In the computer security context, a hacker is someone who seeks
and exploits weaknesses in a computer system or computer network.
Hackers may be motivated by a multitude of reasons, such as profit,
protest, challenge, enjoyment, or to evaluate those weaknesses to
assist in removing them. The subculture that has evolved around
hackers is often referred to as the computer underground.
Types of hacker
 Hackers are of three types:
1. White hat hacker
2. Gray hat hacker
3. Black hat hacker
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify
 Steal many people their thought, important information.
 Destroy enemy’s computer network during the war.
Types of hacking
 Website Hacking
 Network Hacking
 Ethical Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
1. Website Hacking:- Hacking a website means taking control from the website
owner to a person who hacks the website.
2. Network Hacking:- Network Hacking is generally means gathering information
about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc…
over the network.
3. Ethical Hacking:- Ethical hacking is where a person hacks to find weaknesses in
a system and then usually patches them.
4. Email Hacking:- Email hacking is illicit access to an email account or email
correspondence.
5. Password Hacking:- Password Hacking Password cracking is the process of
recovering secret passwords from data that has been stored in or transmitted by a
computer system.
6. Online Banking Hacking:- Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without permission of account holder is
known as Online banking hacking.
7. Computer Hacking:- Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
Robert Tappan Morris
 Robert Tappan Morris was born in 8th November, 1965.
 He is an American computer scientist and entrepreneur.
 He is best known for creating the Morris Worm in 1988, considered the
first computer worm on the Internet.
 Morris was prosecuted for releasing the worm, and became the first
person convicted under the then-new Computer Fraud and Abuse Act.
 He later joined the faculty in the department of Electrical Engineering
and Computer Science at the MIT, where he received tenure in 2006.
Early Life
 Morris was born in 1965 to parents Robert Morris and Anne Farlow Morris.
The senior Morris was a computer scientist at Bell Labs, who helped design
Multics and Unix; and later became the chief scientist at the National Computer
Security Centre, a division of the National Security Agency (NSA).
 He grew up in the Millington section of Long Hill Township, New Jersey and
graduated from Delbarton School in 1983.
 Morris attended Harvard University, and later went on to graduate school at
Cornell. During his first year there, he designed a computer worm that
disrupted many computers on what was then a fledgling internet. This landed
him in court a year later.
The Morris Worm
 Morris' worm was developed in 1988, while he was a graduate student at
Cornell University. He said it was designed to gauge the size of the Internet.
He released the worm from MIT, rather than from Cornell. The worm
exploited several vulnerabilities to gain entry to targeted systems, including:
o a hole in the debug mode of the Unix send mail program,
o a buffer overrun hole in the fingerd network service,
o the transitive trust enabled by people setting up rexec/rsh network logins
without password requirements.
 The worm was programmed to check each computer it found to
determine if the infection was already present. However, Morris
believed that some administrators might try to defeat his worm by
instructing the computer to report a false positive. To compensate
for this possibility, Morris directed the worm to copy itself anyway,
14% of the time, no matter what the response to the infection-status
interrogation.
 This level of persistence was a design flaw: it created system loads
that not only brought it to the attention of system administrators, but
also disrupted the target computers. During the ensuing trial, it was
estimated that the cost in "potential loss in productivity" caused by
the worm and efforts to remove it from different systems ranged
from $200 to $53,000.
Criminal prosecution
 In 1989, Morris was indicted for violating United States Code Title 18,
the Computer Fraud and Abuse Act. He was the first person to be indicted
under this act. In December 1990, he was sentenced to three years of
probation, 400 hours of community service, and a fine of $10,050 plus the
costs of his supervision. He appealed, but the motion was rejected the
following March.
 Morris' stated motive during the trial was "to demonstrate the
inadequacies of current security measures on computer networks by
exploiting the security defects [he] had discovered”.He completed his
sentence as of 1994.
Later life & work
 Morris' principal research interest is computer network
architectures which includes work on distributed hash tables such as
Chord and wireless mesh networks such as Roof net.
 He is a long time friend and collaborator of Paul Graham. In
addition to founding two companies together, Graham dedicated his
book ANSI Common Lisp to Morris, and named the programming
language that generates the online stores' web pages RTML in his
honour. Graham lists Morris as one of his personal heroes, saying
"he's never wrong.”
References
 http://www.hackersonlineclub.com/hackers-types/
 www.wikipedia.org/wiki/Hacker
 www.wikipedia.org/wiki/Hacking
 http://compnetworking.about.com/od/networksecurityprivacy/f/what
-is-hacking.htm
 http://www.urbandictionary.com/define.php?term=hackinghttp://sea
rchsecurity.techtarget.com/definition/hacker
 https://en.wikipedia.org/wiki/Robert_Tappan_Morris
Thank You

Más contenido relacionado

La actualidad más candente (20)

cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cryptography
CryptographyCryptography
Cryptography
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Network security
Network securityNetwork security
Network security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 

Similar a presentation on hacking

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 akibrutry
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Esteban
 

Similar a presentation on hacking (20)

Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Presentation1
Presentation1Presentation1
Presentation1
 
Hacking
HackingHacking
Hacking
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 

Más de Ayush Upadhyay

presentation on heat exchanger
presentation on  heat exchangerpresentation on  heat exchanger
presentation on heat exchangerAyush Upadhyay
 
presentation on carbon fiber
presentation on carbon fiberpresentation on carbon fiber
presentation on carbon fiberAyush Upadhyay
 
presentation on hydraulic pump
presentation on  hydraulic pumppresentation on  hydraulic pump
presentation on hydraulic pumpAyush Upadhyay
 
ppt of thermal insulating materials
ppt of thermal insulating materialsppt of thermal insulating materials
ppt of thermal insulating materialsAyush Upadhyay
 
ppt of fuel injection system
ppt of fuel injection systemppt of fuel injection system
ppt of fuel injection systemAyush Upadhyay
 
ppt of gears manufacturing processes
ppt of gears manufacturing processesppt of gears manufacturing processes
ppt of gears manufacturing processesAyush Upadhyay
 
ppt of solid modeling for cad
ppt of solid modeling for cadppt of solid modeling for cad
ppt of solid modeling for cadAyush Upadhyay
 
ppt of basic concept of iso 9000 & 14000
ppt of basic concept of iso 9000 & 14000ppt of basic concept of iso 9000 & 14000
ppt of basic concept of iso 9000 & 14000Ayush Upadhyay
 

Más de Ayush Upadhyay (8)

presentation on heat exchanger
presentation on  heat exchangerpresentation on  heat exchanger
presentation on heat exchanger
 
presentation on carbon fiber
presentation on carbon fiberpresentation on carbon fiber
presentation on carbon fiber
 
presentation on hydraulic pump
presentation on  hydraulic pumppresentation on  hydraulic pump
presentation on hydraulic pump
 
ppt of thermal insulating materials
ppt of thermal insulating materialsppt of thermal insulating materials
ppt of thermal insulating materials
 
ppt of fuel injection system
ppt of fuel injection systemppt of fuel injection system
ppt of fuel injection system
 
ppt of gears manufacturing processes
ppt of gears manufacturing processesppt of gears manufacturing processes
ppt of gears manufacturing processes
 
ppt of solid modeling for cad
ppt of solid modeling for cadppt of solid modeling for cad
ppt of solid modeling for cad
 
ppt of basic concept of iso 9000 & 14000
ppt of basic concept of iso 9000 & 14000ppt of basic concept of iso 9000 & 14000
ppt of basic concept of iso 9000 & 14000
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

presentation on hacking

  • 1. GANDHINAGAR INSTITUTE OF TECHNOLOGY ACTIVE LEARNING ASSIGNMENT ON “HACKING” CYBER SECURITY [2150002] PREPARED BY:- UPADHYAY AYUSH (150123119053)
  • 3. What is hacking?  Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data(leaving a trace) without the intention of destroying data or maliciously harming the computer.  Hacking is a broad term used to describe many complex activities wherein the end goal is typically to obtain access to a computer system's servers, database(s), or stored files. This access may be any combination or desired or undesired, and legal or illegal.
  • 4.
  • 5. Hacker  A hacker is any person engaged in hacking.  Person who gains authorized/unauthorized access to a computer WITHOUT the intention of causing damage.  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground.
  • 6. Types of hacker  Hackers are of three types: 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker
  • 7. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify  Steal many people their thought, important information.  Destroy enemy’s computer network during the war.
  • 8. Types of hacking  Website Hacking  Network Hacking  Ethical Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 9. 1. Website Hacking:- Hacking a website means taking control from the website owner to a person who hacks the website. 2. Network Hacking:- Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network. 3. Ethical Hacking:- Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. 4. Email Hacking:- Email hacking is illicit access to an email account or email correspondence. 5. Password Hacking:- Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 10. 6. Online Banking Hacking:- Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking. 7. Computer Hacking:- Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 11.
  • 12. Robert Tappan Morris  Robert Tappan Morris was born in 8th November, 1965.  He is an American computer scientist and entrepreneur.  He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet.  Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act.  He later joined the faculty in the department of Electrical Engineering and Computer Science at the MIT, where he received tenure in 2006.
  • 13. Early Life  Morris was born in 1965 to parents Robert Morris and Anne Farlow Morris. The senior Morris was a computer scientist at Bell Labs, who helped design Multics and Unix; and later became the chief scientist at the National Computer Security Centre, a division of the National Security Agency (NSA).  He grew up in the Millington section of Long Hill Township, New Jersey and graduated from Delbarton School in 1983.  Morris attended Harvard University, and later went on to graduate school at Cornell. During his first year there, he designed a computer worm that disrupted many computers on what was then a fledgling internet. This landed him in court a year later.
  • 14. The Morris Worm  Morris' worm was developed in 1988, while he was a graduate student at Cornell University. He said it was designed to gauge the size of the Internet. He released the worm from MIT, rather than from Cornell. The worm exploited several vulnerabilities to gain entry to targeted systems, including: o a hole in the debug mode of the Unix send mail program, o a buffer overrun hole in the fingerd network service, o the transitive trust enabled by people setting up rexec/rsh network logins without password requirements.
  • 15.  The worm was programmed to check each computer it found to determine if the infection was already present. However, Morris believed that some administrators might try to defeat his worm by instructing the computer to report a false positive. To compensate for this possibility, Morris directed the worm to copy itself anyway, 14% of the time, no matter what the response to the infection-status interrogation.  This level of persistence was a design flaw: it created system loads that not only brought it to the attention of system administrators, but also disrupted the target computers. During the ensuing trial, it was estimated that the cost in "potential loss in productivity" caused by the worm and efforts to remove it from different systems ranged from $200 to $53,000.
  • 16. Criminal prosecution  In 1989, Morris was indicted for violating United States Code Title 18, the Computer Fraud and Abuse Act. He was the first person to be indicted under this act. In December 1990, he was sentenced to three years of probation, 400 hours of community service, and a fine of $10,050 plus the costs of his supervision. He appealed, but the motion was rejected the following March.  Morris' stated motive during the trial was "to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects [he] had discovered”.He completed his sentence as of 1994.
  • 17. Later life & work  Morris' principal research interest is computer network architectures which includes work on distributed hash tables such as Chord and wireless mesh networks such as Roof net.  He is a long time friend and collaborator of Paul Graham. In addition to founding two companies together, Graham dedicated his book ANSI Common Lisp to Morris, and named the programming language that generates the online stores' web pages RTML in his honour. Graham lists Morris as one of his personal heroes, saying "he's never wrong.”
  • 18. References  http://www.hackersonlineclub.com/hackers-types/  www.wikipedia.org/wiki/Hacker  www.wikipedia.org/wiki/Hacking  http://compnetworking.about.com/od/networksecurityprivacy/f/what -is-hacking.htm  http://www.urbandictionary.com/define.php?term=hackinghttp://sea rchsecurity.techtarget.com/definition/hacker  https://en.wikipedia.org/wiki/Robert_Tappan_Morris