What Is Hacking, Types of Hacking, and Cyber Crime
What Is Hacking, Types of Hacking, and Cyber Crime
1
Our Group Members
1 2 3 4 5
IRFAN SALMAN UBAID UR RAZA KHALID ADEEL AYYUB
AKHTAR KHALID REHMAN
Reference : The basics you can find anywhere 5 Steps To Successful Storytelling Published on April 5, 2014 Featured in: Marketing & Advertising
2
HACKING
HACKER
A Hacker is a person who finds and exploits the
weakness in computer systems and/or networks
to gain access.
3
A
C
T
Ethical Hacker (White hat): A security hacker who gains access to
systems with a view to fix the identified weaknesses. They may also
perform penetration Testing and vulnerability assessments.
Cracker (Black hat): A hacker who gains unauthorized access to computer systems
for personal gain. The intent is usually to steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.
A
C
T
Grey hat: A hacker who is in between ethical and black hat
hackers. He/she breaks into computer systems without authority
with a view to identify weaknesses and reveal them to the system
owner.
Script kiddies: A non-skilled person who gains access to computer systems using
already made tools.
A
C
T
Hacktivist: A hacker who use hacking to send social, religious, and
political, etc. messages. This is usually done by hijacking websites
and leaving the message on the hijacked website.
7
TYPES The following list presents the common types of
cybercrimes:
Intentional deception for personal Exposing personal information Stealing personal information
gain via the use of computer such as email addresses, phone from somebody and impersonating
systems. number, account details, etc. on that person.
social media, hacking a websites,
etc.
8
TYPES
9
TYPES
This involves intercepting ATM This involves the use of computers Sending unauthorized emails.
card details such as account in multiple locations to attack These emails usually contain
number and PIN numbers. These servers with a view of shutting advertisements.
details are then used to withdraw them down.
funds from the intercepted
accounts.
10
1
WEBSITE DEFACEMENT
Website defacement is an attack on a
website that changes the visual appearance
of the site or a webpage.
This is typically the work of system crackers,
who break into a web server and replace
the hosted website with one of its own. The
most common method of defacement is
using SQL Injections to log on to
administrator accounts.
11 11
2
CYBER BULLYING
Cyber stalking (also called cyber
harassment) is when someone uses the
Internet to threaten or make unwanted
advances towards someone else. This sort
of harassment can cause physical,
emotional, and psychological damage to
the victim.
12
3
COMPUTER VIRUSES AND
WORMS
A virus is a malicious program that passes from
one computer to another. Most viruses are
written with a malicious intent, so that they
may cause damage to programs and data in
addition to spreading themselves..
A worm is a software program that uses
computer networks and security holes to
replicate itself from one computer to another. It
usually performs malicious actions, such as
using the resources of computers as well as
shutting down the computers
13
4
SOCIAL ENGINEERING
Social engineering is a technique used by cyber criminals
to get access to confidential information. With social
engineering, attackers use manipulation and deceit to trick
victims into giving out confidential information. Some of
the social engineering methods used by attackers:
14
4
SOCIAL ENGINEERING
• Telling a victim over the phone that he/she has won a
prize, in return they ask for a credit card number to
deliver it.
15
5
INTELLECTUAL PROPERTY
RIGHTS
Intellectual property rights is concerned with
any act that allows access to patent, trade
secrets, customer data, sales trends, and any
confidential information.
16
!
Hacking Laws and Punishments
There are several federal laws that address hacking, including:
18
THANK YOU
19
THANK YOU
INSPIRE
Click icon to add picture Get them excited about what’s to come
ACTION
Build your presentation and give us your feedback
if this was helpful to you.
21
“
BECAUSE STORYTELLING,
AND VISUAL STORYTELLING,
WAS PUT IN THE HANDS OF EVERYBODY,
WE HAVE ALL NOW BECOME STORYTELLERS.
—LEVAR BURTON
22
A
C
T
VISUALS ADD A COMPONENT TO
STORYTELLING THAT TEXT CANNOT | SPEED.
Images are another element that can drive your point home even more
POWERFUL
PRESENTATIONS !
tips & tricks
24