You are on page 1of 14

Hacking and network

components

BY SABOOH HAROON BUTT


WHAT IS HACKING

 It is a activity of identifying weakness in computer system.


 It is used to get access to any personal information of the user.
 Example: of computer hacking can be: using password cracking
algorithm to gain access to computer system

 Hacking an alarming for computer system


 Computer are mandatory to run a successful business.
 It is not enough to have isolated computer system they should be
networked to facilitate communication with external businesses,
 And this factor expose them to the outside world and hacking.
 System hacking:
 Using computer to commit fraudulent acts such as fraud , privacy
invasion, stealing corporate.
Who is hackers
 A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access.
 Hackers are usually skilled computer programmers with knowledge of
computer security
 Types of hacker:

 ETHICAL HACKER
 CRACKER(BLACK HAT)
 GREY HAT
 HACKTIVIST
Symbol Description

Ethical Hacker (White hat): A security hacker who gains


access to systems with a view to fix the identified
weaknesses. They may also perform penetration Testing 
and vulnerability assessments.

Cracker (Black hat): A hacker who gains unauthorized


access to computer systems for personal gain. The intent
is usually to steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.

Grey hat: A hacker who is in between ethical and black


hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses
and reveal them to the system owner.
What is Ethical Hacking?

• Ethical Hacking is identifying weakness in computer systems and/or computer networks


and coming with countermeasures that protect the weaknesses.
Ethical hackers must abide by the following rules.

 Get written permission from the owner of the computer system and/or computer


network before hacking.
 Protect the privacy of the organization been hacked.
 Transparently report all the identified weaknesses in the computer system to the
organization.
 Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
Information is one of the most valuable assets of an organization. Keeping information
secure can protect an organization’s image and save an organization a lot of money.
Fake hacking can lead to loss of business for organizations that deal in finance such as
PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would
otherwise lead to loss of business.
 Cyber crime

Cybercrime is the activity of using computers and


networks to perform illegal activities like spreading
computer viruses, online bullying, performing
unauthorized electronic fund transfers, etc. 

 Type of Cybercrime
The following list presents the common types of
cybercrimes:
 Computer Fraud
 Privacy violation
 Identity Theft.
 Information Electronic
transfer
Potential security threat
A computer system threat is anything that leads to loss or
corruption of data or physical damage to the hardware and/or
infrastructure.
• Security threat
• Security Threat is defined as a risk that which can potentially
harm computer systems and organization.
• The cause could be physical
• The cause could also be non-physical
• Programing language that re useful to hackers
WEB HACKING
LANGUAGE USE TO WRITE
HTML WEB PAGES Login forms and other data
entry methods on the web
use HTML forms to get
data. Been able to write
and interpret HTML, makes
it easy for you to identify
and exploit weaknesses in
the code.
JAVA SCRIPT CLIENT SIDE SCRIPTING
LANGUAGE
Web Hacking

JavaScript code is executed


on the client browse. You
can use it to read saved
cookies and perform cross
site scripting etc
BASIC COMPUTER NETWOK
COMPONENT
 NETWORK :
o A network is a set of technologies including hardware , software and media that
can be used to connect computer together
o It is used to share information from one computer to several other computer.
o It allow many user to access the shared data and program almost instantly
 Component of networking:
1. Server 10. router
2. Client 11. LAN cable
3. Transmission media
4. Shared data
5. Network interface card
6. Shared printer
7. Local operating system
8. Network operating system
9. Hub
Servers 
 - Servers are computers that hold shared files, programs, and the
network operating system.
 Servers provide access to network resources to all the users of the
network.
 There are many different kinds of servers, and one server can provide
several functions.
 For example, there are file servers, print servers, mail servers,
communication servers, database servers, fax servers and web servers,
to name a few.

CLIENT -
 Clients are computers that access and use the network and shared
network resources.
 Client computers are basically the customers(users) of the network, as
they request and receive services from the servers.
 These days, it is typical for a client to be a personal computer that the
users also use for their own non-network applications.
Transmission Media 
 Transmission media are the facilities used to interconnect computers in a network, such
as twisted-pair wire, coaxial cable, and optical fiber cable.

Shared data
  - Shared data are data that file servers provide to clients such as data files, printer
access programs and e-mail.
 Shared printers and other peripherals - Shared printers and peripherals are hardware
resources provided to the users of the network by servers.
 Resources provided include data files, printers, software, or any other items used by
clients on the network.

Network Interface Card 


 Each computer in a network has a special expansion card called a network interface card
(NIC).
 The NIC prepares(formats) and sends data, receives data, and controls data flow
between the computer and the network.
 On the transmit side, the NIC passes frames of data on to the physical layer, which
transmits the data to the physical link.
 On the receiver's side, the NIC processes bits received from the physical layer and
processes the message based on its contents
Hub -
 Hub is a device that splits a network connection into multiple computers.
 It is like a distribution center.
 When a computer requests information from a network or a specific computer, it sends the request to the
hub through a cable.
Switch -
 Switch is a telecommunication device grouped as one of computer network components.
 Switch is like a Hub but built in with advanced features.
 It uses physical device addresses in each incoming messages so that it can deliver the message to the right
destination or port.
 Unlike a hub, switch doesn't broadcast the received message to entire network, rather before sending it
checks to which system or port should the message be sent.
 Both switch and hub have common features: Multiple RJ-45 ports, power supply and connection lights.
Router -
 When we talk about computer network components, the other device that used to connect a LAN with an
internet connection is called Router.
 When you have two distinct networks (LANs) or want to share a single internet connection to multiple
computers, we use a Router.
 wired and wireless.
Types of Computer Network
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN
Types of Computer Network
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)

. Local Area Network (LAN)


• Local area network is a group of computers connected with each other in
a small places such as school, hospital, apartment etc.

• Metropolitan Area Network:


• MAN network covers larger area by connections LANs to a larger network
of computers. In Metropolitan area network various Local area networks
are connected with each other through telephone lines.
• Wide Area Network:
• Wide area network provides long distance transmission of data. The size
of the WAN is larger than LAN and MAN. A WAN can cover country,
continent or even a whole world

You might also like