Professional Documents
Culture Documents
MICROPROJECT
Information communication technology
Project name :
Leading cyber threts and
Basic awareness to secure
Students name : roll. No:
CONTENTS;
1] WHAT IS THE CYBER WORLD?
2] WHAT IS THE CYBER SECURITY ?
3] TWO MAIN PERSONALITIES IN CYBER WORLD.
{HACKER AND CRACKER}
1
4] DIFFERENCE BETWEEN HACKER AND CRACKER
5] ONE OF THE BEST HACKER WHO CHANGED THE
WORLD.{MARK ZUKERBURG}
6] LEADING CYBER SECURITY THRETS AND BASIC
AWARNESS TO SUCURE FROM IT.
{ PHISHING, PASSWORD CRACKING,VIRUSES,
MALWARE}
Cyber world:
About the Cyber World. The Cyber World, or cyberspace, is more than just the Internet. It refers to
an online environment where many participants are involved in social interactions and have the
ability to affect and influence each other. People interact in cyberspace through the use of digital
media.
Cyber security:
Cyber security refers to a set of techniques used to protect the integrity of networks, programs,
and data from attack, damage or unauthorized access. The most important thing is understanding
2
that everyone is at risk of cyber-attack. Business is increasingly being done over network-
connected devices.
Cracker: A cracker is someone who breaks into someone else's computer system, often on a
network; bypasses passwords or licenses in computer programs; or in other ways intentionally
breaches computer security.
A cracker is one who breaks into or otherwise violates the system integrity of remote machines
with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny
legitimate users service, or cause problems for their targets. Crackers can easily be identified
because their actions are malicious
3
That’s right, one of the most influential people of all time even considers himself a hacker, explaining
that it’s okay to exceed the boundaries, breaking and further developing code. Zuckerberg strongly
believes in hacker culture, which is apparent aside from his lack of care for privacy, however he
believes information should be shared freely and openly so people can further develop and expand
projects.
You may not know, but hacking is a key ingredient to what spawned Facebook, after one night when
Zuckerberg hacked into Harvard’s student record database. Hours later Zuckerberg developed a site,
posting the stolen photos of college girls next to each other, where visitors could rate “who was
hotter.” Zuckerberg did this in attempt to prove that it is possible to aggregate this type of
information. Four hours, 450 visitors and 22,000 photos views later, Harvard pulled the plug on
Zuckerberg’s site after an uproar fled through the campus.
A man worth over $40 billion who created one of the most visited sites online from his dorm room
got his start as a young hacker!
1] Phishing
4
2] Password cracking
3] Viruses
4] Malware
1] Phishing
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in
email or other communication channels. The attacker uses phishing emails to distribute malicious
links or attachments that can perform a variety of functions, including the extraction of login
credentials or account information from victims.
Phishing is popular with cybercriminals, as it is far easier to trick someone into clicking a malicious
link in a seemingly legitimate phishing email than trying to break through a computer's defenses.