0% found this document useful (0 votes)
12 views9 pages

Hacking and Cybercrime

Uploaded by

Navish Thran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

Hacking and Cybercrime

Uploaded by

Navish Thran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

HACKING AND CYBERCRIME

YAAZHOLI
ASSISTANT PROFESSOR
AM JAIN COLLEGE
WHAT IS HACKING
🞂 HACKING IS THE ACT OF GETTING UNAUTHORIZED ACCESS
TO INFORMATION OR DATA IN A COMPUTER SYSTEM.
🞂 “The act of compromising digital devices and networks through
unauthorized access to an account or computer system.”
🞂 The term Hacking could be used to define any act of tinkering a
computer’s hardware/software other than its intended use, in order
to improve it and find out how electronic devices can work
electronically.
🞂 Hacking is not always a malicious act, but it is most commonly
associated with illegal activity and data theft by cyber criminals.
🞂 Since most hacking these days are committed with an intent to steal
data, make money and instil terror in some cases (cyber terrorism).
WHO ARE HACKERS
🞂 Computer hackers are unauthorized users who gain access to
computers in order to steal, alter, or delete data.
🞂 They do this generally by installing malicious software without your
knowledge or agreement.
🞂 They can get access to the information you don’t want them to have
thanks to their cunning techniques and in-depth technological
knowledge.
🞂 Any device is connected to the Internet is at risk from computer
hackers and online predators.
🞂 They seek to achieve goals by non-standard methods, by means of
using their skills in Information Technology.
🞂 Someone with knowledge of bugs or exploits to break into computer
systems and access data which would otherwise be inaccessible to
them.
WHY DO HACKERS HACK
🞂 Four primary motives have been proposed for reasons as to why
hackers hack:
• Criminal Financial gain
• Reputation among other hackers
• Corporate Espionage
• State-sponsored attacks

🞂 A new form of ethical hacking, called “Hacktivism” (a portmanteau


of Hacking and Activism) is another reason for why hackers hack.
HACKTIVISM
🞂 Also called Internet activism, which is the use of electronic-
communication technologies for various forms of activism to enable
faster and more effective communication.
🞂 Hacktivism is the use of computer-based techniques such as
hacking as a form of civil disobedience to promote a political agenda
or social change.
🞂 Often related to free speech, human rights or freedom of information.
🞂 In the simplest and broadest sense, a hacktivist is someone who
uses technology hacking to effect social change.
🞂 Famous hacktivists: Anonymous; Hacktivismo, WikiLeaks, LulzSec
TYPES OF HACKERS
1. Black Hat Hackers: cybercriminals; cracks systems with malicious
intent. Seeks out to gain unauthorized access. Exploits security
vulnerability – by implanting a virus/trojan/malware. Also called
crackers, malicious hackers, unethical hackers.
2. White Hat Hackers: Also called ethical security hackers. Seek to
identify and fix vulnerabilities. Hacks into systems with permission
– to uncover system weakness and fix them – strengthen overall
internet security.
3. Grey hat hackers: “cat on the wall” – not completely malicious, not
ethical either. Goes through with unauthorized hacking, but doesn’t
exploit the weaknesses they find – rather they report it for payment.
TYPES OF HACKING
1. Phishing Attack (luring users to provide vital information such
as passwords or credit card information)
2. Clickjacking Attacks (tricks the user into clicking on links, that
lead to unintentional cash transfers, virus downloads, product
purchases, and links that install malware into computer
systems)
3. Malware (malicious software)
4. SQL Injection Attack (injects an SQL code into an application,
allowing the attacker to view, or even modify data in a
computer system)
5. Denial of Service (denies the user access to certain functions in
their computer)
6. Cross-Site Scripting (inject scripts into web applications used
by others, thus enabling hackers to bypass access)
7. Session attack (take over access to users’ online accounts or
accounts, taking over control to get access to sensitive data
like personal information, passwords, and other private data)
HOW TO PROTECT AGAINST HACKERS
🞂 Download files only from trusted sources
🞂 Do not opt for APKs
🞂 Use Antivirus software
🞂 Install a VPN – paired it with a firewall
🞂 Use strong Passwords – A combination of uppercase and lowercase
letters, numbers and special symbols.
🞂 Enable Two-Factor Authentication
🞂 Do NOT use the same password across your different accounts
🞂 Avoid public Wi-Fi.
🞂 Backup important files.
🞂 Install updates regularly.
The
End

You might also like