hacking (1)
TRANSCRIPT
WHAT IS HACKING ?• Hacking is the intentional unauthorized access to
computer systems
– Illegal activities from harmless pranks to huge thefts and
– shutdowns of services
• Traditionally hacking refers to the hobby/profession of working with computers.
• But now a days it refers to breaking into computer systems.
HISTORY OF HACKING• The first hacker was appeared in 1960’s at the Massachusetts
Institute of Technology(MIT) .
• During the 1970’s , a different kind of hacker appeared : PhonePhreaker or Phone Hacker.
• In the 1980’s, phreaks started to migrate to computers and the first Bulletin Board System(BBS) appeared.
• During the 1990’s, when the use of internet wide spread around the world, hackers multipiled.
What is ethical hacking • BASIC MEANING :
In simple words Ethical Hacking is testing the resources for a good cause and for the betterment of technology. It also means to secure the system.
• TECHNICAL MEANING :Technically Ethical Hacking is done by a computer hacker who is hired by an organization to undertake non malicious hacking work in order to discover computer-security flaws.
WHO ARE ETHICAL HACKERS???
• Completely trustworthy.
• Strong programming and computer networking skills.
• Technique of criminal hackers-Detection-Prevention.
• Ethical hackers possess same skills , mind set and tools of a hacker but the attacks are done in a non destructive manner.
Hacking Process
Footprinting
Scanning
EnumerationAttack and
Gaining Access
Escalating Privilege, Covering
Tracks and Creating Backdoors
TYPES OF HACKING->Website hacking. ->Email hacking.
->Network hacking. ->Password hacking.
->online transactions hacking. ->Computer hacking.
->Mobile hacking. ->PDA hacking.
->Metropolitan system hacking.
WHY DO HACKERS HACK?• Just for fun.
• Hack other systems secretly.
• Notify many people their thought.
• Steal important information.
• Destroy enemy’s computer network during the war
CONSEQUENCES OFILLEGAL HACKING• Thousands of dollars in fines.
• Imprisonment.
• Seizure of your computer.
Black hats
•Very dangerous persons.
•Always have motive to earn huge profits.
•Highly paid persons.
•Evolves themselves mostly in criminal
activities.
•These could be CODERS & ADMINS.
•As well as SCRIPT KIDDIES.
White hats•These are good hackers.
•Have genuine license to hack.
•Have registered police records.
•Evolves themselves in good works.
•Generally owned by companies for
security designing.
•Have high pay scales.
•Generally these are CODERS.
GREY HATS
•Also known as RED HATS.
•Perform both tasks fair and unfair.
•Generally these are ADMINS.
•Have little high pay than white hats.
•Generally not so dangerous but some
times it could be.
WHAT TO DO AFTER BEING HACKED?• Shut down the system.
• Clear the memory using cleaners (like C Cleaner).
• Scan infected sections with good antivirus.
• Separate the system from network (do not use internet)
• Restore the system with the back up. (if o/s problem)
• Finally , connect the system to the network.
HOW CAN BE A REAL HACKER• Study C/C++/Assembly language.
• Study computer architecture.
• Study operating system.
• Study computer network.
• Examine the hacking tools for a month.
• Think the problem of a computer.
SECURITY & COUNTER MEASURES:• Use of Antivirus.
• Proper logout after proper use of mail id.
• Manual opening browser.
• Don’t open spam.
• Password protected admin account.
Did you know ?• Social networking sites like
‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents.
• The average age group of hackers are aged between 14-24 yrs. …
Job of each hacker:
• The White Hat Approach:
This is a more deterministic plan of attack than the Black Box one.
Cyber c rime
IN THE WORLD..
HOW TO PREVENT HACKERS
Change your password everymonth
Install a firewall on your computer
Purchase or download antivirus software
Install antispyware program onto your computer
CONCLUSIONFrom a practical standpoint the security problem will remain as long as manufacturers remain committed to current system.
Regular auditing, vigilant intrusion detection, good system administration practice and computer security awareness are all essential parts of an organization’s security efforts.