0% found this document useful (0 votes)
69 views24 pages

What Is Hacking, Types of Hacking, and Cyber Crime

Criminal hacking and cybercrime involve illegal activities performed using computers and networks. There are different types of hackers categorized by their intent, including ethical hackers who aim to fix security weaknesses, crackers who hack for personal gain, and script kiddies who use pre-existing tools. Common cybercrimes include computer fraud, privacy violations, identity theft, and copyright infringement. Social engineering is a technique used by cybercriminals to trick victims into providing confidential information. Laws like the Computer Fraud and Abuse Act establish criminal penalties for hacking offenses.

Uploaded by

Irfan Missson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views24 pages

What Is Hacking, Types of Hacking, and Cyber Crime

Criminal hacking and cybercrime involve illegal activities performed using computers and networks. There are different types of hackers categorized by their intent, including ethical hackers who aim to fix security weaknesses, crackers who hack for personal gain, and script kiddies who use pre-existing tools. Common cybercrimes include computer fraud, privacy violations, identity theft, and copyright infringement. Social engineering is a technique used by cybercriminals to trick victims into providing confidential information. Laws like the Computer Fraud and Abuse Act establish criminal penalties for hacking offenses.

Uploaded by

Irfan Missson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

CRIMINAL HACKING

AND CYBER CRIMIE

1
Our Group Members

1 2 3 4 5
IRFAN SALMAN UBAID UR RAZA KHALID ADEEL AYYUB
AKHTAR KHALID REHMAN

Reference : The basics you can find anywhere 5 Steps To Successful Storytelling Published on April 5, 2014 Featured in: Marketing & Advertising
2
HACKING
HACKER
A Hacker is a person who finds and exploits the
weakness in computer systems and/or networks
to gain access.

Hacking is the activity of


identifying weaknesses in a
computer system or a network TYPES OF HACKERS
to exploit the security to gain Hackers are classified according to the intent of
access to personal data or their actions. The following list classifies types of
business data. An example of hackers according to their intent:
computer hacking can be: using
a password cracking algorithm
to gain access to a computer
system.

3
A
C
T
Ethical Hacker (White hat): A security hacker who gains access to
systems with a view to fix the identified weaknesses. They may also
perform penetration Testing and vulnerability assessments.

Cracker (Black hat): A hacker who gains unauthorized access to computer systems
for personal gain. The intent is usually to steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.
A
C
T
Grey hat: A hacker who is in between ethical and black hat
hackers. He/she breaks into computer systems without authority
with a view to identify weaknesses and reveal them to the system
owner.

Script kiddies: A non-skilled person who gains access to computer systems using
already made tools.
A
C
T
Hacktivist: A hacker who use hacking to send social, religious, and
political, etc. messages. This is usually done by hijacking websites
and leaving the message on the hijacked website.

Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of


computers.
INTRODUCTION OF CYBER CRIME

Cybercrime is the activity of using computers and networks to perform illegal


activities like spreading computer viruses, online bullying, performing
unauthorized electronic fund transfers, etc. Most cybercrime hacks are
committed through the internet, and some cybercrimes are performed
using Mobile phones via SMS and online chatting applications.

7
TYPES The following list presents the common types of
cybercrimes:

Computer Fraud Privacy violation Identity Theft

Intentional deception for personal Exposing personal information Stealing personal information
gain via the use of computer such as email addresses, phone from somebody and impersonating
systems. number, account details, etc. on that person.
social media, hacking a websites,
etc.

8
TYPES

“Sharing copyrighted “Electronic funds transfer” “Electronic money


files/information” laundering”
This involves gaining an un-
This involves distributing authorized access to bank computer This involves the use of the
copyright protected files such as networks and making illegal fund computer to launder money..
eBooks and computer programs transfers.
etc.

9
TYPES

ATM Fraud Denial of Service Attacks Spam

This involves intercepting ATM This involves the use of computers Sending unauthorized emails.
card details such as account in multiple locations to attack These emails usually contain
number and PIN numbers. These servers with a view of shutting advertisements.
details are then used to withdraw them down.
funds from the intercepted
accounts.

10
1
WEBSITE DEFACEMENT
Website defacement is an attack on a
website that changes the visual appearance
of the site or a webpage.
This is typically the work of system crackers,
who break into a web server and replace
the hosted website with one of its own. The
most common method of defacement is
using SQL Injections to log on to
administrator accounts.

11 11
2
CYBER BULLYING
Cyber stalking (also called cyber
harassment) is when someone uses the
Internet to threaten or make unwanted
advances towards someone else. This sort
of harassment can cause physical,
emotional, and psychological damage to
the victim.

12
3
COMPUTER VIRUSES AND
WORMS
A virus is a malicious program that passes from
one computer to another. Most viruses are
written with a malicious intent, so that they
may cause damage to programs and data in
addition to spreading themselves..
A worm is a software program that uses
computer networks and security holes to
replicate itself from one computer to another. It
usually performs malicious actions, such as
using the resources of computers as well as
shutting down the computers
13
4
SOCIAL ENGINEERING
Social engineering is a technique used by cyber criminals
to get access to confidential information. With social
engineering, attackers use manipulation and deceit to trick
victims into giving out confidential information. Some of
the social engineering methods used by attackers:

• Sending messages that contain dangerous attachments


(e.g. malware) with text that encourage people to open
the attachments.

• Pretending to be the main administrator of a local


network and asking for the victim’s password in order
to perform a maintenance check.

14
4
SOCIAL ENGINEERING
• Telling a victim over the phone that he/she has won a
prize, in return they ask for a credit card number to
deliver it.

• Asking for a user’s password for a certain Internet


service, such as a blog, and later use the same
password to access user’s computer. This technique
works because users often use the same passwords for
many different portals.

15
5
INTELLECTUAL PROPERTY
RIGHTS
Intellectual property rights is concerned with
any act that allows access to patent, trade
secrets, customer data, sales trends, and any
confidential information.

16
!
Hacking Laws and Punishments
There are several federal laws that address hacking, including:

• The Computer Fraud and Abuse Act (CFAA);


• The Stored Communications Act (SCA);
• The Electronic Communications Privacy Act (ECPA); and
• The Defend Trade Secrets Act (DTSA).
Criminal Penalties Under the CFAA

1. Obtaining National Security Information:


10 years; 20 years maximum for a second conviction.
1. Accessing a Computer to Defraud and Obtain Value:
5 years; 10 years maximum for a second conviction.
2. Intentionally Damaging by Knowing Transmission:
1-10 years; 20 years maximum for a second conviction.
3. Extortion Involving Computers:
5 years; 10 years maximum for a second conviction.

18
THANK YOU

19
THANK YOU

Neal Creative © Neal Creative | click & Learn more


TAKEAWAY
What do you want them to remember?

INSPIRE
Click icon to add picture Get them excited about what’s to come

ACTION
Build your presentation and give us your feedback
if this was helpful to you.

21

BECAUSE STORYTELLING,
AND VISUAL STORYTELLING,
WAS PUT IN THE HANDS OF EVERYBODY,
WE HAVE ALL NOW BECOME STORYTELLERS.

—LEVAR BURTON

22
A
C
T
VISUALS ADD A COMPONENT TO
STORYTELLING THAT TEXT CANNOT | SPEED.
Images are another element that can drive your point home even more
POWERFUL
PRESENTATIONS !
tips & tricks

24

You might also like