0% found this document useful (0 votes)
15 views

Computer Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

COMPUTER HACKING

What is Computer Hacking?

Hacking is the act of identifying and then


exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to
personal or organizational data. Hacking is not
always a malicious activity, but the term has
mostly negative connotations due to its
association with cybercrime.
Types Of Hackers
TYPES OF HACKER

White hat hackers – sometimes also called “ethical


hackers” or “good hackers” – are the antithesis
of black hats. They exploit computer systems or
networks to identify their security flaws so they
can make recommendations for improvement.
TYPES OF HACKER

A black hat - is a computer hacker who violates


laws or typical ethical standards for nefarious
purposes, such as cybercrime, cyberwarfare or
malice. The term originates from 1950s westerns,
when bad guys typically wore black hats and good
guys white hats. A black hat is contrasted with a
white hat
TYPES OF HACKER

A grey hat is a computer hacker or computer


security expert who may sometimes violate laws or
typical ethical standards, but usually does not have
the malicious intent typical of a black hat hacker.
The term came into use in the late 1990s, and was
derived from the concepts of "white hat" and
"black hat" hackers.
The Motivations for Hacking

Monetary gain is perhaps the most common reason


for hackers to attack an organization or an
individual. In these cases, threat actors (often
affiliated with cybercrime gangs) target companies
they believe will pay a ransom to recover stolen
information.
Types Of Attack
Types Of Attack

Keyloggers are a particularly insidious type of


spyware that can record and steal consecutive
keystrokes (and much more) that the user enters on
a device. The term keylogger, or “keystroke
logger,” is self-explanatory: Software that logs
what you type on your keyboard
Types Of Attack

Denial-of-service attack is a cyber-attack in which


the perpetrator seeks to make a machine or
network resource unavailable to its intended users
by temporarily or indefinitely disrupting services
of a host connected to a network.
Types Of Attack

“Phishing” refers to an attempt to steal sensitive


information, typically in the form of usernames,
passwords, credit card numbers, bank account
information or other important data in order to
utilize or sell the stolen information.
Types Of Attack

Watering hole attack- is a security exploit that


compromises a site that a targeted victim visits to
gain access to the victim's computer and network
Types Of Attack

Impersonation attack- is a type of targeted


phishing attack where a malicious actor pretends to
be someone else or other entities to steal sensitive
data from unsuspecting employees using social
engineering tactics. Hackers attempt to trick the
victim into transferring money, giving up sensitive
information
Types Of Attack

Pharming - is online fraud that involves the use of


malicious code to direct victims to spoofed
websites in an attempt to steal their credentials and
data.
Types Of Attack

Clickjacking - is an attack that tricks a user into


clicking a webpage element which is invisible or
disguised as another element.
Types Of Attack

Cookie theft -refers to a cyberattack where a


hacker gets access to the user's cookie data, small
files websites store on the user's device. Cookie
theft (also called cookie hijacking) can result in the
attacker gaining access to the user's name, home
address, telephone number, and other sensitive
information.
Types Of Attack

Man-in-the-middle attack - is a cyberattack where


the attacker secretly relays and possibly alters the
communications between two parties who believe
that they are directly communicating with each
other, as the attacker has inserted themselves
between the two parties.
Types Of Attack

Spyware - is malicious software that enters a user's


computer, gathers data from the device and user,
and sends it to third parties without their consent.
6 easy tips to avoid Hacker

1. Maintain strong password.


2. Set up and us Multi-Factor Authentication.
(MFA)
3. Be wary of suspicious emails.
4. Don’t open attachments in suspicious emails.
5. Install security updates for your system as soon
as they lunch.
6. Avoid using public wifi.

You might also like