Professional Documents
Culture Documents
“Types of Hacking”
Submitted by
Saloni Nivrutti Patil
Tanishka Kiran Chopadkar
Devang Jitendra Bhattad
Divya Dattatray Rahane
Affiliated to
Maharashtra State
Board of Technical Education
This is to certify that Ms. Saloni Nivritti Patil with Roll No- 05 has successfully completed
Micro-project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during her tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.
This is to certify that Ms. Tanishka Kiran Chopadkar with Roll No- 12 has successfully
completed Micro- project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during her tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.
This is to certify that Mr. Devang Jitendra Bhattad with Roll No- 41 has successfully completed
Micro-project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during his tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.
This is to certify that Ms. Divya Dattatray Rahane with Roll No- 47 has successfully completed
Micro-project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during her tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.
7 Compilation of Presentation
8 Presentation of Seminar
9 Final Submission
5.0 Resources Required:
Sr
Name of Resource/Material Specification Qty. Remarks
No
1 Hardware Resource Intel i3,2GB RAM 1 -
2 Software Resource Microsoft word 1 -
3 Any Other Resource Internet 1 -
Types of Hacking :-
Phishing –
In this type of hacking, hackers intention is to steal critical information of users like
account passwords, MasterCard detail, etc. For example, hackers can replicate an original
website for users interaction and can steal critical information from the duplicate website
the hacker has created.
Virus –
These are triggered by the hacker into the filters of the website once they enter into it . The
purpose is to corrupt the information or resources on the net website.
UI redress –
In this technique, the hacker creates a pretend interface and once the user clicks with the
intent of progressing to a particular website, they are directed to a special website.
Cookie theft –
Hackers access the net website exploitation malicious codes and steal cookies that contain
tips, login passwords, etc. Get access to your account then will do any factor besides your
account.
Distributed Denial-of-service(DDoS) –
This hacking technique is aimed toward taking down a website so that a user cannot access
it or deliver their service. Gets the server down and stops it from responding, which may
cause a condition error constantly.
DNS spoofing –
This essentially uses the cache knowledge of an internet website or domain that the user
might have forgotten keeping up to date. It then directs the data to a distinct malicious
website.
Social Engineering –
Social engineering is an attempt to manipulate you to share personal info, sometimes by
impersonating a trustworthy supply.
Malware-Injection Devices –
Cyber-criminals will use hardware to sneak malware onto your pc. You would have
detected infected USB sticks which can allow hackers remote access to your device when
Types of Hackers:-
Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These
people hack the system illegally to steal money or to achieve their own illegal goals. They find
banks or other companies with weak security and steal money or credit card information. They
can also modify or destroy the data as well. Black hat hacking is illegal.
White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat
hackers are the good guys of the hacker world.These people use the same technique used by the
black hat hackers. They also hack the system, but they can only hack the system that they have
permission to hack in order to test the security of the system. They focus on security and
protecting IT system. White hat hacking is legal.
Gray Hat Hacker
Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack
any system even if they don't have permission to test the security of the system but they will
never steal money or damage the system. In most cases, they tell the administrator of that
system. But they are also illegal because they test the security of the system that they do not
have permission to test. Grey hat hacking is sometimes acted legally and sometimes not.
Cyber Crime:-
2. Crimes that use computer networks to commit other criminal activities. These
types of crimes include cyber stalking, financial fraud or identity theft.
Types of Cybercrime:-
Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts that
result in loss of life. This may include different type of activities either by software
or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through
the use of cyberspace or computer resources.
Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. These hackers demand huge money in return for assurance to
stop the attacks and to offer protection.
Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of
computers, online control systems and networks. It involves both offensive and
defensive operations concerning to the threat of cyber attacks, espionage and
sabotage.
Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could
include hiding of information or providing incorrect information for the purpose of
deceiving victims for money or property. Internet fraud is not considered a single,
distinctive crime but covers a range of illegal and illicit actions that are committed
in
Internet stalkers -
Internet stalkers are people who maliciously monitor the web
Activity of their victims to acquire personal data. This type of cybercrime is
Conducted through the use of social networking platforms and malware, they
Are able to track an indivisual’s PC activity with little or no detection.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
Use strong password –
Maintain different password and username combinations for each account and resist the
temptation to write them down. Weak passwords can be easily cracked using certain
attacking methods like Brute force attack, Rainbow table attack etc, So make them
complex. That means combination of letters, numbers and special characters.
Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking
involves an authorized attempt to gain unauthorized access to a computer system or data.
Ethical hacking is used to improve the security of the systems and networks by fixing the
vulnerability found while testing.
Ethical hackers improve the security posture of an organization. Ethical hackers use the same
tools, tricks, and techniques that malicious hackers used, but with the permission of the
authorized person. The purpose of ethical hacking is to improve the security and to defend the
systems from attacks by malicious users.
Types of Hacking
We can define hacking into different categories, based on what is being hacked. These are as
follows:
1. Network Hacking
2. Website Hacking
3. Computer Hacking
4. Password Hacking
5. Email Hacking
Network Hacking: Network hacking means gathering information about a network with the
intent to harm the network system and hamper its operations using the various tools like
Telnet, NS lookup, Ping, Tracert, etc.
Website hacking: Website hacking means taking unauthorized access over a web server,
database and make a change in the information.
Computer hacking: Computer hacking means unauthorized access to the Computer and
steals the information from PC like Computer ID and password by applying hacking
methods.
Password hacking: Password hacking is the process of recovering secret passwords from
data that has been already stored in the computer system.
Email hacking: Email hacking means unauthorized access on an Email account and using it
without the owner's permission.
Advantages of Hacking
1. It is used to recover the lost of information, especially when you lost your password.
2. It is used to perform penetration testing to increase the security of the computer and
network.
3. It is used to test how good security is on your network.
Disadvantages of Hacking
2. Hacking is illegal.
Windows and macOS have built-in firewalls — software designed to create a barrier between
your information and the outside world. Firewalls prevent unauthorized access to your business
network and alert you to intrusion attempts.
Ensure the firewall is enabled before going online. You can also purchase a hardware firewall
from companies like Cisco, Sophos or Fortinet, depending on your broadband router, which
also has a built-in firewall that protects your network. If you have a larger business, you can
purchase an additional business networking firewall.
Antivirus software is a small business cybersecurity necessity. Computer viruses and malware
are everywhere. Antivirus programs like Bitdefender, Panda Free Antivirus, Malwarebytes, and
Avast protect your computer against unauthorized code or software that may threaten your
operating system. Viruses may have easy-to-spot effects — for example, they might slow your
computer or delete critical files — or be less conspicuous.
Antivirus software plays a major role in protecting your system by detecting real-time threats to
ensure your data is safe. Some advanced antivirus programs provide automatic updates, further
protecting your machine from the new viruses that emerge daily.
After installing an antivirus program, don’t forget to use it. Run or schedule regular virus scans
to keep your computer virus-free.
Install an antispyware package to protect your business:-
Spyware is software that secretly monitors and collects personal or organizational information.
It’s hard to detect and remove and usually delivers unwanted ads or search results intended to
direct you to specific (often malicious) websites. Some spyware records every keystroke to gain
access to passwords and other financial information.
Antispyware concentrates exclusively on this threat but is often included in major antivirus
packages, including Webroot, McAfee, and Norton. Antispyware packages provide real-time
protection by scanning all incoming information and blocking threats.
Using strong passwords is a crucial way to prevent network intrusions. The more secure your
passwords are, the harder it is for hackers to invade your system.
Secure passwords are usually longer and more complex. Use a password with at least eight
characters and a combination of numbers, uppercase and lowercase letters, and computer
symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes.
Always install operating system updates. Most updates include security fixes that prevent
hackers from accessing and exploiting your data. The same goes for apps.
Today’s web browsers are increasingly sophisticated, especially regarding privacy and security.
Review your browser security settings in addition to installing all new updates. For example,
you can use your browser to prevent websites from tracking your movements, which increases
your online privacy. You can also use a private browsing mode or install a browser specifically
focused on security, like DuckDuckGo or Epic Privacy Browser.
Beware of email messages from unknown parties, and never click on links or open attachments
that accompany them. Inbox spam filters have become good at catching the most conspicuous
spam. But more sophisticated phishing emails that mimic your friends, associates and trusted
businesses (like your bank) have become common, so keep your eyes open for anything that
looks or sounds suspicious.
9.0 Skill Developed:
(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)
(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)
(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)
(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)