Computer Project
Computer Project
ON HACKING
BY: Diganth Krish N
Class VII B
HACKING
Hacking is the use of unconventional or
illicit means to gain unauthorized
access to a digital device, computer
system or computer network.
It is also called as Cyber Hacking.
HACKER
• A hacker is a person skilled in
information technology who achieves
goals by non-standard means. The
term has become associated in
popular culture with a security hacker
– someone with knowledge of bugs or
exploits to break into computer
systems and access data that would
otherwise be inaccessible to them
HACKING REASONS
• Financial gain: Hackers may steal sensitive data, such as credit card details, to sell for
money.
• Revenge: Hackers may use their skills to get back at an individual or organization they
have a personal feud with.
• Social justice: Hackers may use their skills to expose social inequality and corruption. This
is known as hacktivism, which is a combination of the words "activism" and "hacking".
• Curiosity and learning: Hackers may enjoy the intellectual challenge of finding and
exploiting security weaknesses.
• Corporate espionage: Hackers may hack to gain a competitive advantage or disrupt an
organization.
• State-sponsored hacking: Hackers may hack to steal business information or national
intelligence.
• Notoriety: Hackers may hack to gain respect or notoriety for their hacking skills.
TYPES OF
• Black hat hackers : are the "bad guys" of the
hacking scene. They go out of their way to discover HACKERS
vulnerabilities in computer systems and software to
exploit them for financial gain or for more malicious
purposes, such as to gain reputation, carry out
corporate espionage, or as part of a nation-state
hacking campaign.
• White hat hackers : can be seen as the “good
guys” who attempt to prevent the success of black
hat hackers through proactive hacking. They use
their technical skills to break into systems to assess
and test the level of network security, also known as
ethical hacking. This helps expose vulnerabilities in
systems before black hat hackers can detect and
exploit them.
• Grey hat hackers : sit somewhere between the
good and the bad guys. Unlike black hat hackers,
they attempt to violate standards and principles but
without intending to do harm or gain financially. Their
actions are typically carried out for the common
good. For example, they may exploit a vulnerability
to raise awareness that it exists, but unlike white hat
hackers, they do so publicly. This alerts malicious
WORLD’S NO.1 HACKER
Kevin David Mitnick
• He is often considered one of the most famous hackers in
history:
• Known for Breaking into 40 large organizations, including
Nokia, Motorola, and the North American Aerospace
Defense Command (NORAD)
• Born on August 6, 1963 – Died on July 16, 2023.
• He was an American computer security consultant, author,
and convicted hacker.
• He is best known for his high-profile 1995 arrest and five
years in prison for various computer and communications-
related crimes. Mitnick's pursuit, arrest, trial and sentence
were all controversial, as were the associated media
coverage, books and films. After his release from prison, he
ran his own security firm, Mitnick Security Consulting, LLC,
and was also involved with other computer security
businesses.
TOP 10 HACKERS IN THE WORLD
Kevin Mitnick Albert
Gonzalez
Gary McKinnon
John Draper
Loyd
Blankenship
Guccifer
PRECAUTIONS TO AVOID
HACKING
Strengthening your digital defenses
• Maintain strong passwords
• Set up and use Multi-Factor Authentication (MFA)
Navigating email security minefields
• Be wary of suspicious emails
• Don’t open attachments in suspicious emails
Keeping Your Digital Arsenal Up-to-Date
• Install security updates for your system as soon as they launch
• Avoid using public Wi-Fi
THANK YOU