Académique Documents
Professionnel Documents
Culture Documents
Prepared by:
Kshitij kumar singh
Ashish kumar
Aayush bhatnagar
WHAT IS SECURITY
Organizational
Attacks
Restricted
Data
Accidental
Breaches in
Security
Viruses, Trojan
Horses,
and Worms
Denial of
Service (DoS)
Working Ethically
Trustworthiness
Overview of Hacking
Hack
Examinesomethingveryminutely
Therapidcraftingofnewprogramorthemaking
of changes to existing, usually complicated
software
Hacker
Thepersonwhohacks
Cracker
Systemintruder/destroyer
History Of Hacking
The first hacker was appeared in 1960s at the
MassachusettsInstituteOfTechnology(MIT)
During the 1970s, a different kind of hacker
appeared:PhonePhreakerorPhoneHacker
EthicalHacker
Performsmostofthesameactivitiesbutwithowners
permission
EmployedbycompaniestoperformPenetrationTests
Types of Hacker
White Hat Hacker
Goodguys
Dontusetheirskillforillegalpurpose
Computer security experts and help to protect from
BlackHats.
Badguys
Usetheirskillmaliciouslyforpersonalgain
Hackbanks,stealcreditcardsanddefacewebsites
ItisacombinationofWhitehatnBlackHatHackers
Goal of grey hat hackers is to provide national
security
Hacking Process
Footprinting
Escalating Privilege,
Covering Tracks and
Creating Backdoors
Scanning
Enumeration
Ian Murphy
Kevin Mitnick
Johan Helsinguis
Linus Torvald
Mark Abene
Robert Morris
When solving
problems, dig at the
roots instead of just
hacking at the leaves.
ThankYou
ThankYou