SlideShare a Scribd company logo
Hacking A technological threat
Overview What is hacking Types of hacking Ethical hacking Consequences  Conclusion
Hacking Hobby/profession of working with computers. Breaking into computers Gaining access
Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking
Website Hacking Main focus- Vulnerable loopholes  Collapses the information Make changes  in the information
Email Hacking Can Emails Be Hacked? Store business data, private information  Serious precautions are not taken
Computer Hacking Steals information from pc Remote desktop connection technique Accessing other person’s files
Online banking Hacking Online banking disadvantages Hackers create fake websites Using proper website address
Ethical Hacking Computer or network expert Seeking vulnerabilities Victims – Official & Private websites
What do ethical hackers do? An ethical hacker’s evaluation of a system security seeks answers to these basic question: What can an intruder see on the target systems ? What are you trying to protect  ? What can an intruder do with that information  ?
Thousands of dollars in fines Imprisonment  Seizure of your computer Consequences
Conclusion Proper ethical hackers should be employed Do not expose your passwords to untrusted sites Practice using exact web address Close your internet while not in use
Summary Hacking is of two types There are several types of hacking Ethical hacking – a legal method Consequences of illegal hacking
Thank You

More Related Content

What's hot (18)

PPTX
Ethical hacking presentation
Zahid Rajeel
 
KEY
Computer crime hacking
tangytangling
 
PPTX
Hacking
Asma Khan
 
PPT
hacking
mayank1293
 
PPTX
Ethical hacking - Good Aspect of Hacking
Divy Singh Rathore
 
PDF
The History of Hacking in 5minutes (for dummie)
Stu Sjouwerman
 
PPT
basic knowhow hacking
Anant Shrivastava
 
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
PPTX
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
PPSX
Hacking
Ranjan Som
 
DOCX
Ethical Hacking
Sanu Subham
 
DOCX
Ethical hacking
Nitheesh Adithyan
 
PPTX
hacking presentation slide
Tauhidul islam
 
PDF
Research Paper - Hacker Plague
Luke Perrin
 
DOCX
Final report ethical hacking
samprada123
 
PPTX
Hacking
pranav patade
 
PPT
Ethical Hacking and Network Security
sumit dimri
 
Ethical hacking presentation
Zahid Rajeel
 
Computer crime hacking
tangytangling
 
Hacking
Asma Khan
 
hacking
mayank1293
 
Ethical hacking - Good Aspect of Hacking
Divy Singh Rathore
 
The History of Hacking in 5minutes (for dummie)
Stu Sjouwerman
 
basic knowhow hacking
Anant Shrivastava
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
Secure Shell - a Presentation on Ethical Hacking
Nitish Kasar
 
Hacking
Ranjan Som
 
Ethical Hacking
Sanu Subham
 
Ethical hacking
Nitheesh Adithyan
 
hacking presentation slide
Tauhidul islam
 
Research Paper - Hacker Plague
Luke Perrin
 
Final report ethical hacking
samprada123
 
Hacking
pranav patade
 
Ethical Hacking and Network Security
sumit dimri
 

Viewers also liked (20)

PPTX
Hacking & its types
Sai Sakoji
 
PPT
The Web, The User and the Library (and why to get in between)
Guus van den Brekel
 
PPT
Phishing-Updated
Jayaseelan Vejayon
 
PPT
Google as a Hacking Tool
Conferencias FIST
 
PDF
Phishing As Tragedy of the Commons
amiable_indian
 
PPTX
Circular Economy - And Open Source + Hacking As Paths To It
Lars Zimmermann
 
PDF
El Information Security Forum
Conferencias FIST
 
PPT
Google hacking 2015
gopartheredbuff
 
PDF
Google Hacking Basics
amiable_indian
 
PPTX
How To Be A Hacker
Paul Tarjan
 
PDF
Hacking For Innovation Delhi
Christian Heilmann
 
PDF
Athens Bullseye Meetup #1
GrowthRocks
 
PDF
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
Jeremiah Grossman
 
PDF
Hacking For Innovation
Christian Heilmann
 
PDF
Offensive cyber security: Smashing the stack with Python
Malachi Jones
 
PDF
Top Ten Web Hacking Techniques (2008)
Jeremiah Grossman
 
PPT
Introduction to Unity3D Game Engine
Mohsen Mirhoseini
 
PDF
Embedded Systems Security
Malachi Jones
 
PDF
100+ Growth Hacks & What Is Growth Hacking?
Casey Armstrong
 
PDF
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
GrowthRocks
 
Hacking & its types
Sai Sakoji
 
The Web, The User and the Library (and why to get in between)
Guus van den Brekel
 
Phishing-Updated
Jayaseelan Vejayon
 
Google as a Hacking Tool
Conferencias FIST
 
Phishing As Tragedy of the Commons
amiable_indian
 
Circular Economy - And Open Source + Hacking As Paths To It
Lars Zimmermann
 
El Information Security Forum
Conferencias FIST
 
Google hacking 2015
gopartheredbuff
 
Google Hacking Basics
amiable_indian
 
How To Be A Hacker
Paul Tarjan
 
Hacking For Innovation Delhi
Christian Heilmann
 
Athens Bullseye Meetup #1
GrowthRocks
 
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
Jeremiah Grossman
 
Hacking For Innovation
Christian Heilmann
 
Offensive cyber security: Smashing the stack with Python
Malachi Jones
 
Top Ten Web Hacking Techniques (2008)
Jeremiah Grossman
 
Introduction to Unity3D Game Engine
Mohsen Mirhoseini
 
Embedded Systems Security
Malachi Jones
 
100+ Growth Hacks & What Is Growth Hacking?
Casey Armstrong
 
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
GrowthRocks
 

Similar to TYPES OF HACKING (20)

DOCX
Unit II .docx
aryanjaiswal2667
 
PPTX
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
PPTX
Ethical hacking
Goutham Shetty
 
PPTX
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
PPTX
Hacking & Hackers
balti13
 
PPTX
Hacking (1)
Deepu Näñí
 
PPTX
Ethical hacking
Ritwick Mukherjee
 
PPTX
Haking PPT
Sushil Ranjan
 
PDF
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
 
PPTX
Hacking
j naga sai
 
PPTX
Presentation on ethical hacking
Sunny Sundeep
 
PPTX
Hacking presentation
Stevi Edward
 
PDF
Ethical Hacking by Krutarth Vasavada
Krutarth Vasavada
 
PDF
What-is-Hacking and why is it important what are it’s benefits
animefreak00005
 
PDF
Introduction to Ethical Hacking pdf file
debmajumder741249
 
PPTX
Hacking - A Technical Threat
Md. Musfiqur Rahman Foysal
 
PPTX
ETHICAL HACKING
karthickB24
 
PPTX
Hacking
Nafeesa Naeem
 
PDF
Ethical Hacking A high-level information security study on protecting a comp...
Quinnipiac University
 
Unit II .docx
aryanjaiswal2667
 
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Ethical hacking
Goutham Shetty
 
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Hacking & Hackers
balti13
 
Hacking (1)
Deepu Näñí
 
Ethical hacking
Ritwick Mukherjee
 
Haking PPT
Sushil Ranjan
 
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
 
Hacking
j naga sai
 
Presentation on ethical hacking
Sunny Sundeep
 
Hacking presentation
Stevi Edward
 
Ethical Hacking by Krutarth Vasavada
Krutarth Vasavada
 
What-is-Hacking and why is it important what are it’s benefits
animefreak00005
 
Introduction to Ethical Hacking pdf file
debmajumder741249
 
Hacking - A Technical Threat
Md. Musfiqur Rahman Foysal
 
ETHICAL HACKING
karthickB24
 
Hacking
Nafeesa Naeem
 
Ethical Hacking A high-level information security study on protecting a comp...
Quinnipiac University
 

Recently uploaded (20)

PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 

TYPES OF HACKING

  • 2. Overview What is hacking Types of hacking Ethical hacking Consequences Conclusion
  • 3. Hacking Hobby/profession of working with computers. Breaking into computers Gaining access
  • 4. Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking
  • 5. Website Hacking Main focus- Vulnerable loopholes Collapses the information Make changes in the information
  • 6. Email Hacking Can Emails Be Hacked? Store business data, private information Serious precautions are not taken
  • 7. Computer Hacking Steals information from pc Remote desktop connection technique Accessing other person’s files
  • 8. Online banking Hacking Online banking disadvantages Hackers create fake websites Using proper website address
  • 9. Ethical Hacking Computer or network expert Seeking vulnerabilities Victims – Official & Private websites
  • 10. What do ethical hackers do? An ethical hacker’s evaluation of a system security seeks answers to these basic question: What can an intruder see on the target systems ? What are you trying to protect ? What can an intruder do with that information ?
  • 11. Thousands of dollars in fines Imprisonment Seizure of your computer Consequences
  • 12. Conclusion Proper ethical hackers should be employed Do not expose your passwords to untrusted sites Practice using exact web address Close your internet while not in use
  • 13. Summary Hacking is of two types There are several types of hacking Ethical hacking – a legal method Consequences of illegal hacking