ict hacking 3036
TRANSCRIPT
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 1/9
HACKING
Present by:
Mas Hafizra Hanis
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 2/9
WHAT IS HACKING?
usually defined as the act of illegally entering a computer system, and makingunauthorized changes to the files and data contained within
In order to “hack” a system, one must first “crack” the system, hence the term
“cracker.” A cracker is an individual, or group, whose main intent is to maliciously
enter a network, by gaining illegal access, with the goal of damaging the system.Crackers are most commonly referred to as a cyber burglars or vandals
The most widely publicized form of hacking today is „criminal hacking.‟ The definitionof criminal hacking draws a clear distinction between hacking, simply for the purposeof gaining access to a system, versus the term „criminal,‟ which refers to the actual
manipulation of the information contained within the system, whether it be positive ornegative
differentiation between general hacking and criminal hacking has provided somerestitution to victims of criminal hacking attacks by providing them the option of filing
a lawsuit. However even this outcome is problematic due to the reluctance of theGovernment, large corporations, and even some individuals to admit that theirsystems have been illegally penetrated. This factor illustrates the complexity inregulating this form of criminal activity
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 3/9
HACKING SOFTWARE
This type of software, commonly referred to as “spyware,” can be
downloaded directly any computer if adequate prevention methods arenot used to stop it. This software does everything from recording anypasswords typed to copying and recording copies of email that is sent,as well as received. Spyware also keeps a consecutive log of all
websites visited, and it even has the capabilities to allow you to specifywords or phrases for which it will record matches in email, as well as any
documents types in programs available through the computer‟s hard
drive.
It is important to be aware of these threats because they demonstrate
the value and necessity of adequate security.
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 4/9
HOW TO TELL IF YOU‟VE BEEN HACKED?
More indicative signals that your systemcould have been hacked are: discoveringemails in your sent items folder that were not
written nor sent by you, finding that files havebeen moved, or even disappeared, orobserving that desktop icons and toolbarsare blank or even missing
Many attacks, such as email bombs andviruses provide clear evidence of a hacker'spresence.
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 5/9
WHAT TO DO IF YOU'VE BEEN HACKED
The most important step to consider if you suspect yoursystem‟s security has been compromised is to shut off all
connections to the Internet. Although this temporarilydetains you from the ability to trace the PC responsible for
the attack, it does enable you to first protect yourinformation, which is probably your primary concern.
Many firewalls, Zonealarm for one, possess the ability ofmaintaining a detailed description of attempted intrusions.
reported the incident to the specific ISP.
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 6/9
ETHICAL HACKING
Organizations have recently began to realize that one of the best waysto evaluate the threat of intruders gaining admission into their system isto hire security professionals to attempt to do exactly as an intruderwould
In contrast with criminal hackers, ethical hackers must be completelytrustworthy. The responsibility of testing a client‟s systems security,
could privilege ethical hackers to confidential information about theclient.
The principal goal of ethical hacking is to expand the knowledge, andthought processes traditionally held by systems engineers, auditors, andsecurity officers
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 7/9
CONCLUSION
The outcome of hacking cyberspace isneither good nor bad, positive nor negative,constructive nor despructive. It compromises
a general strategy by which to explore andmanipulate the systems of rationality bywhich these modes of assessment become
possible, function, and make sense.
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 8/9
REFERENCE
http://www.wsu.edu/~mejia1/WhatHack.html
http://www.bama.ua.edu/~wilso098/project/sources.html
8/2/2019 Ict Hacking 3036
http://slidepdf.com/reader/full/ict-hacking-3036 9/9
THANK YOU…