Vous êtes sur la page 1sur 21

Report about

((HACKING))

Prepared by :

Ayoub Hossein
Hussein Rahim

Supervised by:

Dr.Fazil Ahmad
Contents:
 What is hacking?
 History of hacking
 Famous hackers
 Types of hacking
 How to secure your self and
information from hack
 Advantages of hacking
 Disadvantages of hacking
 References
What is hacking?
 Hacking refers to an array of activities
which are done to intrude some one else’s
personal information space so as to use it for
malicious, unwanted purposes.
 Hacking is a term used to refer to
activities aimed at exploiting security flaws
to obtain critical information for gaining
access to secured networks
Computers have taken over our lives. People
could not function without them, our electricity
is run by computers, the government could not
function without computers, and there are
many others. Hackers are people who illegally
gain access to, and sometimes tamper with,
information in a computer system. Due to
recent media coverage and corporate interest,
hacker’s activities are now looked down on by
society as criminals. Despite the growing trend
of hacking, very little research has been done
on the hacking world and its culture. The image
of a computer hacker has grown from a
harmless nerd into a vicious techno-criminal. In
reality most hackers are not out to destroy the
world. The hackers in today’s society are not
just board teenagers. Since the introduction of
personal computers in the 1970’s, the art of
computer hacking has grown along with the
changing roles of computers in society. Various
types of people commit computer crimes, the
two most familiar being hackers and crackers. A
hacker is a person who enjoys exploring the
details of a programmable system and how to
stretch their capabilities (Ceruzzi 21). True
hackers are interested not in destruction, but in
technology, and that they circumvent security
only to help improve it. It is similar to an artist
who, instead of painting a beautiful picture,
spays graffiti on a city wall. There have been
stories about hackers breaking into a web site
and than leaving tip on how to improve it with
their e-mail address attached (Roberts 12). True
hackers do not wish to be associated with the
bad hackers, also known as “crackers”. A
cracker is one who breaks security on a system
Who is hacker?

hacker is someone who seeks


and exploits weaknesses in a computer
system or computer network. Hackers may be
motivated by a multitude of reasons, such as
profit, protest, challenge or enjoyment.[1] The
subculture that has evolved around hackers is
often referred to as the computer underground
and is now a known community
History of hacking
Hacking has been around for more than a
century. In the 1870s, several teenagers were
flung off the country's brand new phone system
by enraged authorities. Here's a peek at how
busy hackers have been in the past 35 years.
Early 1960s
University facilities with huge mainframe
computers, like MIT's artificial intelligence lab,
become staging grounds for hackers. At first,
"hacker" was a positive term for a person with a
mastery of computers who could push programs
beyond what they were designed to do.
Early 1980s
Author William Gibson coins the term
"cyberspace" in a science fiction novel called
Neuromancer.
In one of the first arrests of hackers, the FBI
busts the Milwaukee-based 414s (named after
the local area code) after members are accused
of 60 computer break-ins ranging from
Memorial Sloan-Kettering Cancer Center to Los
Alamos National Laboratory.
Comprehensive Crime Control Act gives
Secret Service jurisdiction over credit card
and computer fraud.
Two hacker groups form, the Legion of Doom
in the United States and the Chaos Computer
Club in Germany.
2600: The Hacker Quarterly is founded to share
tips on phone and computer hacking.
Famous hackers

Famous Hackers in History

Ian Murphy Kevin Mitnick Johan Helsinguis

Linus Torvalds Mark Abene Robert Morris


Types of hacking
 Website hacking
Hacking a website means taking control
from website owner to a person who hacks
the website
 Network hacking
Network hacking is generally means
gathering information about domain by
using tools like:
Telnet, Ns look up, Ping, Tracert,
Netstat,etc…over the network.
 Email hacking
Email hacking is illicit access to an email
account or email correspondence.
 Password hacking
Password hacking cracking is the process
of recovering secret passwords from data
that has been stored in or transmitted by a
computer system.
 Online banking hacking
Online banking hacking unauthorized
accessing bank accounts without knowing
the password or without permission of
account holder is known as online banking
hacking
 Computer hacking
Computer hacking is when
files on your computer are
viewed , created , or edited
without your authorization .
How to secure from hack
Computer security is security applied to
computing devices such
as computers and smartphones, as well
as computer networks such as private and public
networks, including the whole Internet. The
field includes all the processes and mechanisms
by which digital equipment, information and
services are protected from unintended or
unauthorized access, change or destruction, and
is of growing importance due to the increasing
reliance of computer systems in most
societies.[1] It includes physical security to
prevent theft of equipment and information
security to protect the data on that equipment. It
is sometimes referred to as "cyber security" or
"IT security". Those terms generally do not refer
to physical security, but a common belief among
computer security experts is that a physical
security breach is one of the worst kinds of
security breaches as it generally allows full
access to both data and equipment.
Cybersecurity is the process of applying security
measures to ensure confidentiality, integrity,
and availability of data. Cybersecurity attempts
to assure the protection of assets, which includes
data, desktops, servers, buildings, and most
importantly, humans. The goal of cybersecurity
is to protect data both in transit and at rest.
Countermeasures can be put in place in order to
increase the security of data. Some of these
measures include, but are not limited to, access
control, awareness training, audit and
accountability, risk assessment, penetration
testing, vulnerability management, and security
assessment and authorization.
Advantages of hacking
major advantage of ethical hacking is that it
helps an organization better protect its
systems and information. It is a way of
augmenting the efforts of an organization's
information technology professionals. The
adoption of ethical hacking techniques must
be a part of an organization's overall
security efforts. However, the realities of
tight budgeting mean that this additional
layer of security is not always a priority for
many organizations.
hacking tools are used to test the security
of a network, pc etc.
Disadvantages of hacking

Disadvantages of hacking - Unauthorized


access of computer, Hacking is to steal
ones secret by breaking security like free
internet, free calls,yahoo,stealing ones mail
hacking tools are used to test the security
of a network, pc etc.
References
www.wikipedia.org/wiki/hacker
www.wikipedia.org/wiki/hacking
www.netuser.com
www.hackers.com/lernhacking
www.google.com/uk(search)
http://www.hackersonlineclub.com/hacking-
tools

Vous aimerez peut-être aussi