SlideShare una empresa de Scribd logo
1 de 16
Hacking And
Online Security
By: Jeanie Lyn Arnoco
What is Hacking ?
The Process of attempting to gain or
successfully gaining, unauthorized
access to computer resources is called
Hacking.
Who is a hacker?
is someone who seeks and exploits weaknesses in a
computer system or computer network.
The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers whether computer criminal (black hats)
or computer security expert (white hats),is more
appropriately called a cracker instead.
Types of Hacking
Website Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Network Hacking
Ethical Hacking
Email Hacking
Website Hacking
Hacking a website means taking
control from the website owner to a
person who hacks the website.
Network Hacking
Network Hacking is generally means
gathering information about domain by
using tools like Telnet, Ns look UP, Ping,
Tracert, Netstat, etc… over the network.
Ethical Hacking
Ethical hacking is where a person
hacks to find weaknesses in a system
and then usually patches them.
Email Hacking
Email hacking is illicit access to an
email account or email
correspondence.
Password Hacking
Password Hacking Password cracking
is the process of recovering secret
passwords from data that has been
stored in or transmitted by a
computer system.
Online Banking Hacking
Online banking Hacking Unauthorized
accessing bank accounts without
knowing the password or without
permission of account holder is known as
Online banking hacking.
Computer Hacking
Computer Hacking is when files on
your computer are viewed, created,
or edited without your authorization.
Advantages of hacking
•To recover lost information where the
computer password has been lost.
•Teaches you that no technology is 100%
secure.
•To test how good security is on your own
network.
Disadvantages of Hacking
 Criminals
It can use it to their advantage can
harm someone's privacy
It's Illegal
Online Security
-is a branch of computer security specifically
related to the Internet, often
involving browser security but also network
security on a more general level as it applies
to other applications or operating
systems on a whole.
Online Security Tips
•Secure Your password
•Sign in and out
•Secure Network
•Lock Your Screen or Device
•Device Maintenance
•Prevent Identity Theft
•Prevent Online Fraud
Hacking and Online Security

Más contenido relacionado

La actualidad más candente (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 

Destacado

(CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region (CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region Jeanie Arnoco
 
Restaurante sal y leña
Restaurante sal y leñaRestaurante sal y leña
Restaurante sal y leñasalylena
 
Alta gerencia para hoteles y restaurantes(1)
Alta gerencia para hoteles y restaurantes(1)Alta gerencia para hoteles y restaurantes(1)
Alta gerencia para hoteles y restaurantes(1)Walter Flores
 
đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008
đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008
đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008laonap166
 
Evaluation of kidney function
Evaluation of kidney functionEvaluation of kidney function
Evaluation of kidney functionTsegaye Melaku
 
情報セキュリティCAS 第七十一回放送用スライド
情報セキュリティCAS 第七十一回放送用スライド情報セキュリティCAS 第七十一回放送用スライド
情報セキュリティCAS 第七十一回放送用スライドKumasan, LLC.
 
Monica Roca Perez acusación
Monica Roca Perez acusaciónMonica Roca Perez acusación
Monica Roca Perez acusaciónMuroPolitico
 
Deming’s 14 Points for Management
Deming’s 14 Points for ManagementDeming’s 14 Points for Management
Deming’s 14 Points for ManagementJeanie Arnoco
 
Occupational Outlook Summary: Fastest Growing
Occupational Outlook Summary: Fastest GrowingOccupational Outlook Summary: Fastest Growing
Occupational Outlook Summary: Fastest GrowingHub.Careers
 
13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES
13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES
13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RESAr. Archana Jaiswal
 
Heterogenität in Bewegung
Heterogenität in BewegungHeterogenität in Bewegung
Heterogenität in BewegungFabian Mundt
 

Destacado (14)

(CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region (CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region
 
Restaurante sal y leña
Restaurante sal y leñaRestaurante sal y leña
Restaurante sal y leña
 
Amoxicillin and clavulonate
Amoxicillin and clavulonateAmoxicillin and clavulonate
Amoxicillin and clavulonate
 
Aki
AkiAki
Aki
 
Alta gerencia para hoteles y restaurantes(1)
Alta gerencia para hoteles y restaurantes(1)Alta gerencia para hoteles y restaurantes(1)
Alta gerencia para hoteles y restaurantes(1)
 
đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008
đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008
đồNg bộ hóa dữ liệu trên 2 database server dùng sql server 2008
 
Evaluation of kidney function
Evaluation of kidney functionEvaluation of kidney function
Evaluation of kidney function
 
情報セキュリティCAS 第七十一回放送用スライド
情報セキュリティCAS 第七十一回放送用スライド情報セキュリティCAS 第七十一回放送用スライド
情報セキュリティCAS 第七十一回放送用スライド
 
Monica Roca Perez acusación
Monica Roca Perez acusaciónMonica Roca Perez acusación
Monica Roca Perez acusación
 
Juran’s Trilogy
Juran’s TrilogyJuran’s Trilogy
Juran’s Trilogy
 
Deming’s 14 Points for Management
Deming’s 14 Points for ManagementDeming’s 14 Points for Management
Deming’s 14 Points for Management
 
Occupational Outlook Summary: Fastest Growing
Occupational Outlook Summary: Fastest GrowingOccupational Outlook Summary: Fastest Growing
Occupational Outlook Summary: Fastest Growing
 
13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES
13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES
13-03-2017_PORTFOLIO_ACADEMIC_PROFESSIONAL_LOW_RES
 
Heterogenität in Bewegung
Heterogenität in BewegungHeterogenität in Bewegung
Heterogenität in Bewegung
 

Similar a Hacking and Online Security

Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackersbalti13
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: HackingBareetSingh
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxmahamnisar6
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 

Similar a Hacking and Online Security (20)

Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
HACKING
HACKINGHACKING
HACKING
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Hacking
HackingHacking
Hacking
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Más de Jeanie Arnoco

The Database Environment Chapter 15
The Database Environment Chapter 15The Database Environment Chapter 15
The Database Environment Chapter 15Jeanie Arnoco
 
The Database Environment Chapter 14
The Database Environment Chapter 14The Database Environment Chapter 14
The Database Environment Chapter 14Jeanie Arnoco
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13Jeanie Arnoco
 
The Database Environment Chapter 12
The Database Environment Chapter 12The Database Environment Chapter 12
The Database Environment Chapter 12Jeanie Arnoco
 
The Database Environment Chapter 11
The Database Environment Chapter 11The Database Environment Chapter 11
The Database Environment Chapter 11Jeanie Arnoco
 
The Database Environment Chapter 10
The Database Environment Chapter 10The Database Environment Chapter 10
The Database Environment Chapter 10Jeanie Arnoco
 
The Database Environment Chapter 9
The Database Environment Chapter 9The Database Environment Chapter 9
The Database Environment Chapter 9Jeanie Arnoco
 
The Database Environment Chapter 8
The Database Environment Chapter 8The Database Environment Chapter 8
The Database Environment Chapter 8Jeanie Arnoco
 
The Database Environment Chapter 7
The Database Environment Chapter 7The Database Environment Chapter 7
The Database Environment Chapter 7Jeanie Arnoco
 
The Database Environment Chapter 6
The Database Environment Chapter 6The Database Environment Chapter 6
The Database Environment Chapter 6Jeanie Arnoco
 
The Database Environment Chapter 5
The Database Environment Chapter 5The Database Environment Chapter 5
The Database Environment Chapter 5Jeanie Arnoco
 
The Database Environment Chapter 4
The Database Environment Chapter 4The Database Environment Chapter 4
The Database Environment Chapter 4Jeanie Arnoco
 
The Database Environment Chapter 3
The Database Environment Chapter 3The Database Environment Chapter 3
The Database Environment Chapter 3Jeanie Arnoco
 
The Database Environment Chapter 2
The Database Environment Chapter 2The Database Environment Chapter 2
The Database Environment Chapter 2Jeanie Arnoco
 
The Database Environment Chapter 1
The Database Environment Chapter 1The Database Environment Chapter 1
The Database Environment Chapter 1Jeanie Arnoco
 
Introduction to BOOTSTRAP
Introduction to BOOTSTRAPIntroduction to BOOTSTRAP
Introduction to BOOTSTRAPJeanie Arnoco
 
Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Jeanie Arnoco
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data StructureJeanie Arnoco
 
Quality Gurus Student
Quality Gurus StudentQuality Gurus Student
Quality Gurus StudentJeanie Arnoco
 

Más de Jeanie Arnoco (20)

The Database Environment Chapter 15
The Database Environment Chapter 15The Database Environment Chapter 15
The Database Environment Chapter 15
 
The Database Environment Chapter 14
The Database Environment Chapter 14The Database Environment Chapter 14
The Database Environment Chapter 14
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13
 
The Database Environment Chapter 12
The Database Environment Chapter 12The Database Environment Chapter 12
The Database Environment Chapter 12
 
The Database Environment Chapter 11
The Database Environment Chapter 11The Database Environment Chapter 11
The Database Environment Chapter 11
 
The Database Environment Chapter 10
The Database Environment Chapter 10The Database Environment Chapter 10
The Database Environment Chapter 10
 
The Database Environment Chapter 9
The Database Environment Chapter 9The Database Environment Chapter 9
The Database Environment Chapter 9
 
The Database Environment Chapter 8
The Database Environment Chapter 8The Database Environment Chapter 8
The Database Environment Chapter 8
 
The Database Environment Chapter 7
The Database Environment Chapter 7The Database Environment Chapter 7
The Database Environment Chapter 7
 
The Database Environment Chapter 6
The Database Environment Chapter 6The Database Environment Chapter 6
The Database Environment Chapter 6
 
The Database Environment Chapter 5
The Database Environment Chapter 5The Database Environment Chapter 5
The Database Environment Chapter 5
 
The Database Environment Chapter 4
The Database Environment Chapter 4The Database Environment Chapter 4
The Database Environment Chapter 4
 
The Database Environment Chapter 3
The Database Environment Chapter 3The Database Environment Chapter 3
The Database Environment Chapter 3
 
The Database Environment Chapter 2
The Database Environment Chapter 2The Database Environment Chapter 2
The Database Environment Chapter 2
 
The Database Environment Chapter 1
The Database Environment Chapter 1The Database Environment Chapter 1
The Database Environment Chapter 1
 
Introduction to BOOTSTRAP
Introduction to BOOTSTRAPIntroduction to BOOTSTRAP
Introduction to BOOTSTRAP
 
Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data Structure
 
Quality Gurus Student
Quality Gurus StudentQuality Gurus Student
Quality Gurus Student
 
QUALITY STANDARDS
QUALITY STANDARDSQUALITY STANDARDS
QUALITY STANDARDS
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Hacking and Online Security

  • 2. What is Hacking ? The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 3. Who is a hacker? is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers whether computer criminal (black hats) or computer security expert (white hats),is more appropriately called a cracker instead.
  • 4. Types of Hacking Website Hacking Password Hacking Online Banking Hacking Computer Hacking Network Hacking Ethical Hacking Email Hacking
  • 5. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 6. Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 7. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 8. Email Hacking Email hacking is illicit access to an email account or email correspondence.
  • 9. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 10. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 11. Computer Hacking Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 12. Advantages of hacking •To recover lost information where the computer password has been lost. •Teaches you that no technology is 100% secure. •To test how good security is on your own network.
  • 13. Disadvantages of Hacking  Criminals It can use it to their advantage can harm someone's privacy It's Illegal
  • 14. Online Security -is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.
  • 15. Online Security Tips •Secure Your password •Sign in and out •Secure Network •Lock Your Screen or Device •Device Maintenance •Prevent Identity Theft •Prevent Online Fraud