SlideShare una empresa de Scribd logo
1 de 11
hacking

By conor stellman
Virus
• A piece of code that is capable of copying
  itself and typically has a detrimental effect,
  such as corrupting the system or destroying
  data
Code hacking
• In common usage, a hacker is a stereotypical
  person who breaks into computers and
  computer networks, either for profit or
  motivated by the challenge.
Places hacked
• AT&T Corp., Griffith Air Force Base, NASA, and
  the Korean Atomic Research Institute all fell
  prey to hackers in the 1990s
•
•
•
    Types of Hacking
    Hacking Types
                            Types of hacking
•   1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs
    include stealing passwords (which hackers then use or sell), performing industrial espionage, causing
    harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and
    observant employees who guard their passwords and PCs can thwart many of these security breeches.
•   2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that
    outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are
    most often connected by well-meaning but ignorant employees.
•   3) Back Doors - Hackers can gain access to a network by exploiting back doors 'administrative
    shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of
    computerized searchers (bots), hackers can probably find any weakness in your network.
Types of hacking continued
•   4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach
    themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut
    down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
•   5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-
    ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus,
    password gobbler, or remote-control SW that gives the hacker control of the PC.
•
    6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal
    access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or
    Transmission Control Protocol, TCP, packets).
•   Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult
    to block because it uses multiple, changing, source IP addresses.
•   7) Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking I your network?
•   Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.
•   Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW
    (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
•   Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez,
    which they launch.
•   Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels
    slighted, exploited, ripped off, or unloved.
•   8) Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can
    happen through simple eavesdropping or something more sinister.
ANONYMOUS
• Attempt to hack Facebook
• Successfully hacked facebook and other sites
Virus security
• MacAfee
• Norton
• ADT
video
• http://www.youtube.com/watch?v=_B-tppLBwY8&
summary
• Hacking is a crime that effect computers
  everywhere
• The virus is a piece of code that is capable of
  copying itself and typically has a detrimental
  effect, such as corrupting the system or
  destroying data
The end

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Hacking
HackingHacking
Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Destacado

Invest search
Invest searchInvest search
Invest search
paniker
 
Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112
PachangasyChangos
 
Dwyer Flow Meters
Dwyer Flow MetersDwyer Flow Meters
Dwyer Flow Meters
SHORTBUS101
 
Overview of Azure and Cloud Computing
Overview of Azure and Cloud ComputingOverview of Azure and Cloud Computing
Overview of Azure and Cloud Computing
Abhishek Sur
 
BLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vidaBLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vida
Joanna Ferrero Socias
 
Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1
muslimehelfen
 
Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180
Claudia_Ruiz_Sanchez
 
Some Insights on Startups - a founders journey
Some Insights on Startups - a founders journeySome Insights on Startups - a founders journey
Some Insights on Startups - a founders journey
Roger L. Basler de Roca
 
Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2
Independent
 

Destacado (20)

Invest search
Invest searchInvest search
Invest search
 
Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112Condiciones de uso brincolines p&c 050112
Condiciones de uso brincolines p&c 050112
 
Estudio sobre la actividad exportadora de los arquitectos españoles
Estudio sobre la actividad exportadora de los arquitectos españolesEstudio sobre la actividad exportadora de los arquitectos españoles
Estudio sobre la actividad exportadora de los arquitectos españoles
 
Dwyer Flow Meters
Dwyer Flow MetersDwyer Flow Meters
Dwyer Flow Meters
 
Free UK UFO National Archives Documents
Free UK UFO National Archives DocumentsFree UK UFO National Archives Documents
Free UK UFO National Archives Documents
 
Overview of Azure and Cloud Computing
Overview of Azure and Cloud ComputingOverview of Azure and Cloud Computing
Overview of Azure and Cloud Computing
 
BLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vidaBLOGGING-Qué supone y cómo puede cambiar tu vida
BLOGGING-Qué supone y cómo puede cambiar tu vida
 
Estudio emprendedores colombianos
Estudio emprendedores colombianosEstudio emprendedores colombianos
Estudio emprendedores colombianos
 
Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1Stellenbeschreibung juni 2010 1
Stellenbeschreibung juni 2010 1
 
Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180Presentacion trabajo final(1)_grupo_102058_180
Presentacion trabajo final(1)_grupo_102058_180
 
Sisare,Servicios Informáticos
Sisare,Servicios InformáticosSisare,Servicios Informáticos
Sisare,Servicios Informáticos
 
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 201513vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
13vo Seminario Internacional JKA Shihan. Tatsuya Naka 2015
 
Some Insights on Startups - a founders journey
Some Insights on Startups - a founders journeySome Insights on Startups - a founders journey
Some Insights on Startups - a founders journey
 
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
La culpa no es del oso. Un ejemplo de cómo una misma acción puede vender todo...
 
Cristian lopez
Cristian lopezCristian lopez
Cristian lopez
 
O amor não é um jogo de criança krishnananda
O amor não é um jogo de criança krishnanandaO amor não é um jogo de criança krishnananda
O amor não é um jogo de criança krishnananda
 
Crowdfunding per la radio: analisi e casi di studio
Crowdfunding per la radio: analisi e casi di studioCrowdfunding per la radio: analisi e casi di studio
Crowdfunding per la radio: analisi e casi di studio
 
Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2Clase 1 fundacom 2011 parte2
Clase 1 fundacom 2011 parte2
 
Fichas
FichasFichas
Fichas
 
Analisis experiencias educ_japon
Analisis experiencias educ_japonAnalisis experiencias educ_japon
Analisis experiencias educ_japon
 

Similar a Hacking

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 

Similar a Hacking (20)

Hacking
HackingHacking
Hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 

Más de powerpointking1 (9)

Explosives
ExplosivesExplosives
Explosives
 
Zodiac
ZodiacZodiac
Zodiac
 
Warren court
Warren courtWarren court
Warren court
 
Presidental candidates and thier beliefs
Presidental candidates and thier beliefsPresidental candidates and thier beliefs
Presidental candidates and thier beliefs
 
Juvinile cases
Juvinile casesJuvinile cases
Juvinile cases
 
Area 51 and roswell
Area 51 and roswellArea 51 and roswell
Area 51 and roswell
 
Blood
BloodBlood
Blood
 
Afis
AfisAfis
Afis
 
Eastern state
Eastern stateEastern state
Eastern state
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Hacking

  • 2. Virus • A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  • 3. Code hacking • In common usage, a hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge.
  • 4. Places hacked • AT&T Corp., Griffith Air Force Base, NASA, and the Korean Atomic Research Institute all fell prey to hackers in the 1990s •
  • 5. • • Types of Hacking Hacking Types Types of hacking • 1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breeches. • 2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees. • 3) Back Doors - Hackers can gain access to a network by exploiting back doors 'administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
  • 6. Types of hacking continued • 4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail. • 5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break- ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC. • 6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets). • Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. • 7) Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking I your network? • Anarchists are people who just like to break stuff. They usually exploit any target of opportunity. • Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit. • Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch. • Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved. • 8) Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.
  • 7. ANONYMOUS • Attempt to hack Facebook • Successfully hacked facebook and other sites
  • 10. summary • Hacking is a crime that effect computers everywhere • The virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data