0% found this document useful (0 votes)
121 views

"Hacking": Bachelor of Computer Application (A Choice Based Credit System)

The document discusses the topic of hacking. It defines hacking as intruding computer systems with or without authorization. It describes different types of hackers - black hat (illegal), white hat (ethical security specialists), and grey hat (may violate ethics but without malicious intent). It outlines some common hacking techniques like keyloggers, denial of service attacks, viruses/trojans, and phishing. The document also discusses advantages like recovering lost data, and disadvantages like harming privacy and security breaches. It concludes with tips to improve online security.

Uploaded by

Gaurav Bhatia
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views

"Hacking": Bachelor of Computer Application (A Choice Based Credit System)

The document discusses the topic of hacking. It defines hacking as intruding computer systems with or without authorization. It describes different types of hackers - black hat (illegal), white hat (ethical security specialists), and grey hat (may violate ethics but without malicious intent). It outlines some common hacking techniques like keyloggers, denial of service attacks, viruses/trojans, and phishing. The document also discusses advantages like recovering lost data, and disadvantages like harming privacy and security breaches. It concludes with tips to improve online security.

Uploaded by

Gaurav Bhatia
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

INFORMATICS & COMPUTATIONAL SCIENCES PROGRAMME

UNIVERSITY COLLEGE OF SCIENCE


MOHANLAL SUKHADIA UNIVERSITY,UDAIPUR
(NAAC Accredited 'A' Grade University)

BACHELOR OF COMPUTER APPLICATION


(A Choice Based Credit System)

BCA IV SEMESTER,2019
Section-A

A Seminar Report
On

“Hacking”

Submitted To : Submitted By:


Dr. Avinash Panwar Gaurav Bhatia
CONTENTS :

 What is Hacking?

 Types of hacker

 Hacking Techniques

 Advantages of Hacking

 Disadvantages of Hacking

 Conclusion

 References
WHAT IS HACKING?

Hacking is the process of intruding computer systems with or without


authorization in order to gain access to them, for good or bad
purposes.
Depending on the purpose it is done, hacking can either be good or be
bad. The hackers hack into the company’s database with proper
permission in order to check for vulnerabilities and eliminate them.
This helps the companies in finding system flaws and correcting
them.
Computers have become mandatory to run successful businesses. It is
not enough to have isolated computers systems; they need to be
networked to facilitate communication with external businesses. This
exposes them to the outside world and hacking. Hacking means using
computers to commit fraudulent acts such as fraud, privacy invasion,
stealing corporate/personal data, etc. Cyber crimes cost many
organizations millions of dollars every year. Businesses need to
protect themselves against such attacks
TYPES OF HACKERS -

1. BLACK HAT HACKER -

A black hat hacker is a person who attempts to find computer security


vulnerabilities and exploit them for personal financial gain or other
malicious reasons. This differs from white hat hackers, which are
security specialists employed to use hacking methods to find security
flaws that black hat hackers may exploit.

Black hat hackers can inflict major damage on both individual


computer users and large organizations by stealing personal financial
information, compromising the security of major systems, or shutting
down or altering the function of websites and networks.

Black hat hacking is illegal practice and it comes in the category of


cyber crime.
Black hat hackers are referred as cyber criminals.
2. WHITE HAT HACKER -

A white hat hacker is a computer security specialist who breaks into


protected systems and networks to test and asses their security. White
hat hackers use their skills to improve security by exposing
vulnerabilities before malicious hackers (known as black hat hackers)
can detect and exploit them. Although the methods used are similar,
if not identical, to those employed by malicious hackers, white hat
hackers have permission to employ them against the organization that
has hired them.

White hat hackers are usually seen as hackers who use their skills to
benefit society. They may be reformed black hat hackers or they may
simply be well-versed in the methods and techniques used by
hackers. An organization can hire these consultants to do tests and
implement best practices that make them less vulnerable to malicious
hacking attempts in the future.

For the most part, the term is synonymous with "ethical hacker."
3. GREY HAT HACKER –

A grey hat hacker (also spelled grey hat hacker) is someone who may
violate ethical standards or principles, but without the malicious
intent ascribed to black hat hackers. Gray hat hackers may engage in
practices that seem less than completely above board, but are often
operating for the common good. Gray hat hackers represent the
middle ground between white hat hackers, who operate on behalf of
those maintaining secure systems, and black hat hackers who act
maliciously to exploit vulnerabilities in systems.

Many people see the world of IT security as a black-and-white


world. However, gray hat hacking does play a role in the security
environment. One of the most common examples given of a gray hat
hacker is someone who exploits security vulnerability in order to
spread public awareness that the vulnerability exists. In this case,
experts might say that the difference between a white hat hacker and
a gray hat hacker is that the gray hat hacker exploits the vulnerability
publicly, which allows other black hat hackers to take advantage of it.
By contrast, a white hat hacker may do it privately in order to alert
the company, without making the results public.
HACKING TECHNIQUES:

1. KEYLOGGER : Keylogger is a simple software that records


the key sequence and strokes of your keyboard into a log file on
your machine. These log files might even contain your personal
email ids and passwords.

2. DENIAL OF SERVICE ATTACK: A denial of service


attack is a hacking technique to take down a site or server by
flooding that site or server with a lot of traffic that the server is
unable to process all the requests in the real time and finally
crashes down.

3. VIRUS OR TROJANS : Virus or trojans are malicious


software programs which get installed into the victim’s system and
keep sending the victims data to the hacker.

4. PHISHING : Phishing is a hacking technique using which a


hacker replicates the most-accessed sites and traps the victim by
sending that spoofed link.
Once the victim tries to login or enter some data, the hacker gets
that private information of the target victim using the trojan
running on the fake site.
5. CLICKJACKING: In clickjacking the attacker hijacks the
clicks of the victim that aren’t meant for the exact page, but for a
page where the hacker wants you to be.

6. COOKIE THEFT: The cookies of a browser keep our personal


data such as browsing history, username, and passwords for
different sites that we access. once the hacker gets the access to
your cookie, he can even authenticate himself as you on a browser.

7. ETHICAL HACKING : Ethical Hacking sometimes called as


Penetration Testing is an act of intruding/penetrating into system
or networks to find out threats, vulnerabilities in those systems
which a malicious attacker may find and exploit causing loss of
data, financial loss or other major damages. The purpose of ethical
hacking is to improve the security of the network or systems by
fixing the vulnerabilities found during testing.
ADVANTAGES OF HACKING :

 Can be used to recover lost information where the computer


password has been lost.

 Teaches you that no technology is 100% secure.

 To test how good security is on your own network.

 They call it white hat computer hacking.

DISADVANTAGES OF HACKING :

o Criminals can use it to their advantage.

o It can harm someone's privacy .

o Massive security breach

o It's Illegal.
CONCLUSION:

 Change password frequently.

 Whenever using public computers check for background software.

 While using internet check whether the website you’re using is


genuine or not.

 Update your pc and install antivirus.

 Check for spoofed link.

 Password should contain combination of characters, digits, special


symbols.

 When you are doing any online transection always keep watch on site
whether the protocol of site is https & whether there is a lock symbol
or not .

 Do not respond to fake or phishing email.


References:

www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
https://www.hackerone.com/start-hacking
https://www.techopedia.com/hacking

https://www.malwarebytes.com/hacker/

You might also like