100% found this document useful (1 vote)
96 views22 pages

Institute of Engineering & Technology: Subject - Colloquium Subject Code - (NIT-456)

This document is a presentation by Pakhi Patel on the topic of hacking. It discusses the history of hacking, definitions of key terms like "hacker" and "cracker", examples of famous hackers, reasons why people hack, different types of hacking like website, network, and password hacking. It also provides advice on what to do if hacked and how to create strong passwords. Both advantages like testing security and disadvantages like privacy risks are outlined. The conclusion emphasizes password protection and checking for security on online transactions.

Uploaded by

anuj kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
96 views22 pages

Institute of Engineering & Technology: Subject - Colloquium Subject Code - (NIT-456)

This document is a presentation by Pakhi Patel on the topic of hacking. It discusses the history of hacking, definitions of key terms like "hacker" and "cracker", examples of famous hackers, reasons why people hack, different types of hacking like website, network, and password hacking. It also provides advice on what to do if hacked and how to create strong passwords. Both advantages like testing security and disadvantages like privacy risks are outlined. The conclusion emphasizes password protection and checking for security on online transactions.

Uploaded by

anuj kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

JP Institute of

Engineering & Technology

Subject – Colloquium
Subject code - (NIT-456)

Submitted by
Submitted to Pakhi Patel
Ajay Gupta B-Tech I.T. 2nd year
Roll no.1528213021
Hacking
Contents
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking?
 What should do after hacked
 How to give a password to account
 Advantages of hacking
 Disadvantages of hacking
 Conclusion
History of hacking

 Hacking has been a part of computing for 40 years.


 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT, origin of the
term “Hacker”.
 The truth hacker amongst our societies have thirst for
the knowledge.
 Boredom is never an object of challenge for the
hacker
What is Hacking?

 The process of attempting to gain or successfully


gaining unauthorized access to computer
resources is called Hacking.
Who is a hacker?

 In the computer security context, a hacker is


someone who seeks and exploits weaknesses in a
computer system or computer network.
 The term hacker is reclaimed by computer
programmers who argue that someone breaking
into computer is better called a cracker.
Famous Hackers in History
Why do hackers hack?

 Just for fun.


 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the
war.
Types of Hacking

 Website Hacking
 Network Hacking
 Ethical Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Website Hacking

 Hacking a website means taking control from the


website owner to a person who hacks the
website.
Network Hacking

 Network Hacking is generally means gathering


information about domain by using tools like
Telnet, Ns look UP, Ping, Netstat, etc… over the
network.
Ethical Hacking

 Ethical hacking is where a person hacks to find


weaknesses in a system and then usually patches
them.
Email Hacking

 Email hacking is illicit access to an email account


or email correspondence.
Password Hacking

 Password hacking is the process of recovering


passwords from data that has been stored in or
transmitted by a computer system.
Online Banking Hacking

 Online banking hacking unauthorized accessing


bank accounts without knowing the password or
without permission of account holder is known as
online banking hacking.
Computer Hacking

 Computer Hacking is when files on your computer


are viewed, created, or edited without you
authorization.
What should do after hacked?

 Shutdown the system


- or turn off the system
 Separate the system from network
 Restore the system with the backup
- or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to give a password to
account
 Use unique passwords for your accounts.
 Choose a combination of letters, numbers, or
symbols to create a unique password.
Advantages of hacking

 Can be used to recover lost information where the


computer password has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own network.
 They call it while hat computer hacking.
Disadvantages of hacking

 Criminals can use it to their advantage.


 It can harm someone’s privacy.
 It’s illegal
Conclusion

 Keep your password protected. Write your


password should be with combination of
characters, digits, special symbols. Do not
respond to feck on fishing email. When you are
doing any online transaction always keep watch
on site whether the protocol of site is https &
whether there is a lock symbol.
Thank you
- Pakhi Patel

You might also like