You are on page 1of 7

HACKING

Ram Kumar
29/02/2016

HACKING - DEFINITION

a person who illegally gains access to and


sometimes tampers with information in a
computer system
Computer hacking refers to the practice of
modifying or altering computer software
and hardware to accomplish a goal that is
considered to be outside of the creators original
objective.

WHAT CAN COMPUTER HACKERS AND


PREDATORS DO TO YOU?

Hijack your usernames and passwords


Steal your money and open credit card and bank
accounts in your name
Ruin your credit
Request new account Personal Identification
Numbers (PINs) or additional credit cards
Make purchases
Add themselves or an alias that they control as an
authorized user.
Use and abuse your personal information
Sell your information to other parties who will use
it for illicit or illegal purposes

STEPS TO PROTECT YOUR


COMPUTER FROM HACKERS
Use a 2 way firewall.
Update your operating system regularly.
Increase your browser security settings.
Avoid questionable Web sites.
Only download software from sites you trust.
Don't open messages from unknown senders.
Useantivirusprotection
Get antispyware software protection

INTERCONNECTED COSTS TO SOCIETY


FINANCIAL LOSSES
the loss of revenue and employee time
According to an article published by the BBC, computer
hacking cost companies in the United Kingdom billions of
pounds in 2004.
In their paper "The Economics of Computer Hacking,"
economists Peter Leeson and Christopher Coyne write that
computer viruses created by hackers cost businesses $55
billion in 2003.
In 2011, a single instance of hacking on the Play Station
cost Sony more than $170 million, while Google lost
$500,000 due to hacking in 2005.
According to Richard Power, editorial director of the
Computer Security Institute, single instances of hacking
may cost as much as $600,000 to $7m a day for online
businesses in 2011

INTERCONNECTED COSTS TO SOCIETY


LOSS OF INFORMATION

Hacking often results in a loss of data due to files


being deleted or changed.
Customer information and order information can
be stolen and deleted
leak of top secret information could cause realworld security issues.

REF

http://
www.merriam-webster.com/dictionary/hacker
http://cyber.laws.com/hacking

http://
smallbusiness.chron.com/effects-computer-hackin
g-organization-17975.html
http://
science.opposingviews.com/negative-effects-hacke
rs-2867.html

You might also like