You are on page 1of 9

“PROFESSIONAL PRACTICES”

BSCS 5TH-B
COURSE SUPERVISIOR:
MA’AM: SAMREEN JAVED
GROUP MEMBERS:
AFIA BASHIR AHMED CSC-17S-077
SAWAIBA ABDUL SATTAR CSC-17S-072
JUWARIAH SYED CSC-17S-055
“HACKING & ITS
PROFESSIONAL ISSUES”
ABSTRACT

Hacking is much the same as a disease that has perilous impacts on the general public. Today in this
cutting edge world, where measures have been taken to improve the security level in the dispersed
frameworks programmers have figured out how to split into frameworks and remove data.
INTRODUCTION

Programmers can achieve hacking for the amount of reasons, for instance, advantage, fun or praise.
All over it is practiced for positive reasons, for instance, offering weaknesses to the ones who are
having them and afterward they should clear it with the objective that the genuine software
engineers couldn't break their security viably. Programmers should be possible seriously by
undermining exploited people and requesting for payment cash. Programmers are regularly called
as PC software engineers who know some sort of language (or directions) which the PC
comprehends and breaks into PCs. There are significantly two sorts of Hackers: White Hat (Those
who do hacking for positive reasons referenced above) Hackers and Black Hat Hackers (Those who
hack for cash, fun, or satisfaction). This lead the White Hat Hackers that they are being stigmatized
as called as basically programmers. So at long last the White Hat Hackers were called as Hackers
and Black Hat Hackers were called as Crackers.
WHAT IS HACKING?
TYPES OF HACKING:

DARK HAT HACKERS


WHITE HAT HACKERS
SCOPE:

In the event that we find in the extent of PC security, a programmer is an individual who attempts
to rupture the PC security by discovering shortcomings in a PC or organize or any sort of PC
program. They can accomplish for the quantity of reasons, for example, benefit, fun or acclaim.
Some of the time it is accomplished for positive reasons, for example, giving shortcomings to the
ones who are having them and after that they should evacuate it with the goal that the genuine
programmers couldn't break their security effectively.
METHODOLOGY
Hacking can be done following 5 steps such as:

• Foot printing: This includes usage of some malleable methods to gain the information.

• Scanning: Here the information is obtained from the foot printing phase to attack the
targeted PC.

• Covering track: The hacker eventually remove all his evidence.

• System hacking: planning is done for attacking the system; hacking tools are being used to
attack.

• Planting backdoors: They are generally PC programs that give an attacker the remote access
to a focused on PC framework.
SOLUTION
In the event that you are hacked, you can complete various things to keep yourself from
further hacking:

Reset your password


Output your machine
Confirm account subtleties
Tell your different contacts about the hack
CONCLUSION

•The hacker has the demand all over the world. Hacking is done both legally and illegally. The media
is the main cause to boost the hacking scope because the people were aware of the term hacking
through media. Any kind of security can be hacked. It is mostly spread in social media and
computer networks. As I concluded, In the near future, because of hackers, every program will be
open-sourced.

You might also like