0% found this document useful (0 votes)
50 views9 pages

La1.S02.1 Located and Present Information On Impact of Ict: Hacking

This document discusses hacking and provides definitions and examples. It defines hacking as unauthorized access to a computer system done by a hacker. It notes that while some hackers have bad intentions, most are computer experts in security fields. Examples of famous hackers like Steve Jobs and Steve Wozniak are provided. Ethical hacking is discussed as a way for security professionals to understand hacking techniques in order to prevent attacks. Methods that hackers use and ways to prevent hacking are outlined. References are provided at the end.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views9 pages

La1.S02.1 Located and Present Information On Impact of Ict: Hacking

This document discusses hacking and provides definitions and examples. It defines hacking as unauthorized access to a computer system done by a hacker. It notes that while some hackers have bad intentions, most are computer experts in security fields. Examples of famous hackers like Steve Jobs and Steve Wozniak are provided. Ethical hacking is discussed as a way for security professionals to understand hacking techniques in order to prevent attacks. Methods that hackers use and ways to prevent hacking are outlined. References are provided at the end.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

LA1.S02.

1 LOCATED AND PRESENT


INFORMATION ON IMPACT OF ICT

HACKING
NAME ●
MUHD AFIF MIRZA BIN KHALIDI

4AMANAH
CLASS

OR 4DEDI KASI

TEACHER NAME ●
PN. SYAZRAH
DEFENITION OF HACKING!!!!!!!
-HACKING IS AN UNAUTHORISED ACCESS TO THE COMPUTER SYSTEM
DONE BY A HACKER.
-HACKING IS A SOURCE OF TREAT TO SECURITY IN COMPUTER .
-IT IS DEFINED AS UNAUTHORISED ACCESS TO THE COMPUTER
SYSTEM BY A HACKER.
HOW HACKER WORK

 “Hacker" has gotten a bad reputation


 They steal information and they can destroy
the economy or start a war by hacking the
military computer systems.
 While there's no denying that there are
hackers out there with bad intentions, they
make up only a small percentage of the
hacker community.
WHAT IS HACKER
 A hacker who breaks into systems primarily to steal
is not regarded as a computer expert, although they
can be. A hacker within the professional world of
computing is regarded as a professional computer
expert within his field. In the professional computing
world, a hacker can be a computer and network
security expert. hey can also be a highly skilled
software programmer or a hardware modifier. The
type of hacker who breaks into bank accounts or a
company’s network does exist, but the meaning is
entirely different from that of a professional hacke
FAMOUS HACKER
 Steve Jobs and Steve Wozniak, founders of Apple
Computers, are both hackers. Some of their early
exploits even resemble the questionable activities of
some malicious hackers. However, both Jobs and
Wozniak outgrew their malicious behavior and began
concentrating on creating computer hardware and
software. Their efforts helped usher in the age of the
personal computer -- before Apple, computer
systems remained the property of large corporations,
too expensive and cumbersome for average
consumers.
HACKER
The meaning of a hacker is one who accesses a
computer that can supposably not be accessed to
non authorized people of the community. Hackers
may use any type of system to access this
information depending on what they intend on
doing in the system. Methods hackers may use a
variety of ways to hack into a system. First, if the
hacker is experienced and smart the hacker will use
telnet to access a shell on another machine so that
the risk of getting caught is lower than doing it
using their own system
What the best way to stop
hacker
 Get a firewall.

One standard answer:

Try a online antivirus scanner and a online anti-


hadware/malware/spyware scanner in safe mode with
network to clean up your computer BEFORE you download
anything.
To format you computer and reinstall is the last option.

Turn off system restore before you boot up in safe mode with
network to clean your system restore points for viruses,
spyware, adware etc.
Ethical hacker

 Hackers Center Ethical Hacker is aimed at helping new


Hackers learn Ethical Hacking from school view with steps
and guidance. Learning Ethical Hacking hasn't been so easy
until now. We make sure that people thriving to learn
security know how to learn in matter of weeks and not years.
We are security portal and believe that to become a good
security professional one must know as much as a black hat
hacker. After completing this program, you should be able to
understand security and advance into professional security.
This program may be updated or modified as we see fit. This
is an educational program and it is not meant to teach you
hacking for profit or illegal purposes.
SOURCES OF REFERENCE
http://answers.yahoo.com/question/index?qid=20091115105112AAe3j0M

 THANK Q TO MY GROUP MEMBERS:


 FAZRUL
 HAZIQ THANK Q
SO MUCH

You might also like