Professional Documents
Culture Documents
Hacking is the act of identifying and then exploiting weaknesses in a computer system or network,
usually to gain unauthorized access to personal or organizational data.
Key logger
A small piece of software that, when downloaded into your computer, will record every
keystroke. The key logger will capture every keystroke on the keyboard, every username,
password and credit card number, etc., exposing all of your data and personal information.
ClickJacking attack
This method tricks you into clicking on something different from what you thought you
were clicking. The clickjacking element could be a button on a web page that, when clicked,
performs another function, allowing others to take control of the computer
Cookie theft
The cookies in your web browsers (Chrome, Safari, etc.) store personal data such as
browsing history, username, and passwords for different sites we access. Hackers will send
I.P. (data) packets that pass through your computer, and they can do that if the website you
are browsing doesn’t have an SSL (Secure Socket Layer) certificate.Websites that begin with
HTTPS:// are secure, whereas sites that start
Viruses/Malwares/Trojan horse
Hackers will target potential victims via email, messages and websites with downloadable
content or peer-to-peer networks. When the victim download the content, the
malwares/viruses will spread through their computer, locking their files, …