You are on page 1of 13

R S I TY ( A P )

KL UN I V E
E M E N T O N
ADVERT IS

“HAC K I N G ”

-PRESENTED BY TEAM
“ICONICS”
TEAM MEMBERS

• ROHITH (CSE) - 2100032589


• DISHA (CSE) – 2100032590
• PRANAY (CSE) - 2100032591
• BINDU (CSE) - 210003259
• CHARAN (EEE)-2100060025
CONTENTS
• MEANING OF HACKING
• BRIEF STORY OF HACKING
• WHY DO PEOPLE HACK?
• TYPES OF HACKING
• TYPES OF HACKERS
• CONCLUSION
MEANING OF HACKING

• A commonly used hacking definition is the act of compromising digital devices


and networks through unauthorized access to an account or computer system.
• Hacking is not always a malicious act, but it is most commonly associated with
illegal activity and data theft by cyber criminals.
• Hacking is a technique in which any one can access any ones computer without
his permission.
A BRIEF STORY OF HACKING

• The hackers were not even known as hackers but as practical jokers.
• The very first hack came in 1878 when the phone company, Bell
Telephone, was started.
• A group of teenage boys, hired to run the switchboards, would
disconnect or misdirect calls.
• The first authentic computer hackers came in the 1960s.
WHY DO PEOPLE HACK?
• Some common reasons for hacking include basic bragging rights,
curiosity, revenge, boredom, challenge, theft for financial gain,
sabotage, vandalism, corporate espionage, blackmail, and extortion.
• Hackers are known to regularly cite these reasons to explain their
behavior.
• Just for fun.showoff.
• Hack other system secretly.
• Destroy enemys computer network.
TYPES OF HACKING
• WHITE HAT HACKERS
• BLACK HAT HACKERS
• GRAY OF HACKERS
• WHITE HAT HACKERS -
• White hat hackers are the good guys, who include professional penetration testers who
break into systems with permission, malware researchers who study malicious code to provide
better understanding and to disclose vulnerabilities to vendors, etc.
• BLACK HAT HACKERS –
• Black Hat hackers are criminals who break into computer networks with malicious
intent. They may also release malware that destroys files, holds computers hostage, or steals
passwords, credit card numbers, and other personal information.
• GRAY HAT HACKERS –
• Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat
hackers often look for vulnerabilities in a system without the owner's permission or knowledge.
If issues are found, they report them to the owner, sometimes requesting a small fee to fix the
problem.
TYPES OF HACKING

• WEB SITE HACKING


• EMAIL HACKING
• NETWORK HACKING
• PASSWORD HACKING
• COMPUTER HACKING
• WEBSITE HACKING –
• Web hacking refers to exploitation of applications via HTTP which can be done by
manipulating the application via its graphical web interface, tampering the Uniform Resource Identifier
(URI) or tampering HTTP elements not contained in the URI.
• EMAIL HACKING –
• Email hacking is the unauthorized access to, or manipulation of, an account or email
correspondence.
• NETWORK HACKING –
• Network hack is Simply put, it is the unauthorised access to or control over computer
network security systems for some illicit purpose. ... They can destroy, steal or even prevent authorized
users from accessing the system.
• PASSWORD HACKING –
• Password hacking is often referred to as password cracking. In a genuine case, the
password hacker tries to recover passwords from data transmitted by or stored on a computer. System
administrators may use password hacking as a preventive tactic, to help a legitimate user retrieve a
forgotten password.
• COMPUTER HACKING –
• A commonly used hacking definition is the act of compromising digital devices
and networks through unauthorized access to an account or computer system. Hacking is not
always a malicious act, but it is most commonly associated with illegal activity and data theft by
cyber criminals
CONCLUSION
• Hacking is a good computing skill that can be used for good or bad
intention.
• There is reason to do the hack, and there are ways to prevent it.
• Proper ethical hackers should be employed.
• Do not expose your passwords to untrusted sites.
• Close your internet while not in use
THANK YOU!

You might also like