Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 14

Hacking

A technological threat

Overview
What is hacking Types of hacking Ethical hacking Consequences Conclusion

Hacking
Hobby/profession of working with computers. Breaking into computers Gaining access

Types of Hacking
Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking

Website Hacking
Main focus- Vulnerable loopholes Collapses the information Make changes in the information

Email Hacking
Can Emails Be Hacked?

Store business data, private information


Serious precautions are not taken

Computer Hacking
Steals information from pc Remote desktop connection technique Accessing other persons files

Online banking Hacking


Online banking disadvantages

Hackers create fake websites


Using proper website address

Ethical Hacking
Computer or network expert Seeking vulnerabilities Victims Official & Private websites

What do ethical hackers do?


An ethical hackers evaluation of a system security seeks answers to these basic question:
What can an intruder see on the target systems?

What are you trying to protect ?

What can an intruder do with that information ?

Consequences
Thousands of dollars in fines Imprisonment Seizure of your computer

Conclusion
Proper ethical hackers should be employed
Do not expose your passwords to untrusted sites Practice using exact web address Close your internet while not in use

Summary
Hacking is of two types There are several types of hacking

Ethical hacking a legal method


Consequences of illegal hacking

Thank You

You might also like