Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
173 views10 pages

HACKING

The document discusses the history and types of hacking including black hat, white hat and grey hat hackers. It describes how hacking works through social engineering, passwords and malware. Key drivers for hacking are listed as financial gain, espionage, notoriety and politically motivated reasons. Methods of prevention and ethical hacking are also outlined.

Uploaded by

kika.klinkova
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
173 views10 pages

HACKING

The document discusses the history and types of hacking including black hat, white hat and grey hat hackers. It describes how hacking works through social engineering, passwords and malware. Key drivers for hacking are listed as financial gain, espionage, notoriety and politically motivated reasons. Methods of prevention and ethical hacking are also outlined.

Uploaded by

kika.klinkova
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

HACKING

Kamila Líšková & Kristína Klinková


HISTORY OF HACKING
• First appeared in 1970s
• “The Hacker Papers“
• Movies Tron & War Games
• Potential national security risk
HOW HACKING WORKS
SOCIAL ENGENEERING
HACKING PASSWORDS
• a manipulation technique designed
to exploit human error to gain • trial and error method is known

access to personal information as a brute force attack, involves


• using a fake identity hackers trying to guess every
• phishing scams possible combination to gain
• spam emails access
• instant messages • dictionary attack, which is a
• fake websites program that inserts common
words into password fields to see if
one works.
INFECTING DEVICES WITH MALWARE

• malware, or malicious software, is any program or file that is


intentionally harmful to a computer, network or server
• hackers may infiltrate a user’s device to install malware
• target potential victims via email, instant messages and websites with
downloadable content or peer-to-peer networks
KEY DRIVERS WHICH LEAD TO HACKING

1) financial gain through the theft of credit card details


2) corporate espionage
3) to gain notoriety or respect for their hacking talents
4) state-sponsored hacking that aims to steal business
information and national intelligence
5) politically motivated hackers – hacktivists - who aim to raise
public attention by leaking sensitive information, such as
Anonymous, LulzSec, and WikiLeaks
TYPES OF HACKING
01 Black Hat Hackers – “The bad guys“
• inflict serious damage on both computer users and the organizations they work for, hey can
steal sensitive personal information, compromise computer and financial systems, and alter
or take down the functionality of websites and critical networks

02 White Hat Hackers – “The good guys“


• helps expose vulnerabilities in systems before black hat hackers can detect and
exploit them
• ethical hacking
06
03 Grey Hat Hackers
• between the good and the bad guys
• common good
What can be hacked?
WebCams
Smart devices

Email
Routers
PREVETION FROM GETTING
HACKED
1) SOFTWARE UPDATE
2) UNIQUE PASSWORDS

3) HTTPS ENCRYPTION - https://www.gymgolnr.sk/

4) INSTALL ANTIVIRUS SOFTWARE


5) USE A VPN - a virtual private network
6) Avoid clicking on ads or strange links
ETHICAL HACKING
• refers to the actions carried out by white hat security hackers
• involves gaining access to computer systems and networks to test for potential
vulnerabilities, and then fixing any identified weaknesses
• legal
• https://www.fortinet.com/resources/cyberglossary/what-is-hacking
• https://www.kaspersky.com/resource-center/definitions/what-is-hacking
• https://www.techtarget.com/searchsecurity/definition/malware
THANK YOU FOR
YOUR
ATTENTION

You might also like