You are on page 1of 5

Government polytechnic solapur.

MICROPROJECT
Information communication technology

Project name :
Leading cyber threts and
Basic awareness to secure
Students name : roll. No:

Aniket harishchandara dhumal . 10.


Shubham nitin gadre. 13.
Rudra ravindra gore. 15.
Pratik dilip bansode. 04.
Guided by-

CONTENTS;
1] WHAT IS THE CYBER WORLD?
2] WHAT IS THE CYBER SECURITY ?
3] TWO MAIN PERSONALITIES IN CYBER WORLD.
{HACKER AND CRACKER}
1
4] DIFFERENCE BETWEEN HACKER AND CRACKER
5] ONE OF THE BEST HACKER WHO CHANGED THE
WORLD.{MARK ZUKERBURG}
6] LEADING CYBER SECURITY THRETS AND BASIC
AWARNESS TO SUCURE FROM IT.
{ PHISHING, PASSWORD CRACKING,VIRUSES,
MALWARE}

Cyber world:
About the Cyber World. The Cyber World, or cyberspace, is more than just the Internet. It refers to
an online environment where many participants are involved in social interactions and have the
ability to affect and influence each other. People interact in cyberspace through the use of digital
media.

Cyber security:
Cyber security refers to a set of techniques used to protect the integrity of networks, programs,
and data from attack, damage or unauthorized access. The most important thing is understanding

2
that everyone is at risk of cyber-attack. Business is increasingly being done over network-
connected devices.

Two main personalities in cyber


world:
Hacker: A hacker is an individual who uses computer, networking or other skills to overcome
a technical problem. The term hacker may refer to anyone with technical skills, but it often refers
to a person who uses his or her abilities to gain unauthorized access to systems or networks in
order to commit crimes.

Cracker: A cracker is someone who breaks into someone else's computer system, often on a
network; bypasses passwords or licenses in computer programs; or in other ways intentionally
breaches computer security.

Main difference between hacker and


cracker:
A hacker is a person intensely interested in the arcane and recondite workings of any computer
operating system. Hackers are most often programmers. As such, hackers obtain advanced
knowledge of operating systems and programming languages. They might discover holes within
systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share
what they have discovered, and never intentionally damage data.

A cracker is one who breaks into or otherwise violates the system integrity of remote machines
with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny
legitimate users service, or cause problems for their targets. Crackers can easily be identified
because their actions are malicious

One of the best hacker


Mark Zukerburg (CEO Facebook)

3
That’s right, one of the most influential people of all time even considers himself a hacker, explaining
that it’s okay to exceed the boundaries, breaking and further developing code. Zuckerberg strongly
believes in hacker culture, which is apparent aside from his lack of care for privacy, however he
believes information should be shared freely and openly so people can further develop and expand
projects.

You may not know, but hacking is a key ingredient to what spawned Facebook, after one night when
Zuckerberg hacked into Harvard’s student record database. Hours later Zuckerberg developed a site,
posting the stolen photos of college girls next to each other, where visitors could rate “who was
hotter.” Zuckerberg did this in attempt to prove that it is possible to aggregate this type of
information. Four hours, 450 visitors and 22,000 photos views later, Harvard pulled the plug on
Zuckerberg’s site after an uproar fled through the campus.

A man worth over $40 billion who created one of the most visited sites online from his dorm room
got his start as a young hacker!

Leading cyber threats.

1] Phishing
4
2] Password cracking
3] Viruses
4] Malware

1] Phishing
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in
email or other communication channels. The attacker uses phishing emails to distribute malicious
links or attachments that can perform a variety of functions, including the extraction of login
credentials or account information from victims.

Phishing is popular with cybercriminals, as it is far easier to trick someone into clicking a malicious
link in a seemingly legitimate phishing email than trying to break through a computer's defenses.

You might also like