Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

HACKING

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

HACKING

Kamila Líšková & Kristína Klinková


HISTORY OF HACKING
• First appeared in 1970s
• “The Hacker Papers“
• Movies Tron & War Games
• Potential national security risk
HOW HACKING WORKS
SOCIAL ENGENEERING
HACKING PASSWORDS
• a manipulation technique designed
to exploit human error to gain • trial and error method is known

access to personal information as a brute force attack, involves


• using a fake identity hackers trying to guess every
• phishing scams possible combination to gain
• spam emails access
• instant messages • dictionary attack, which is a
• fake websites program that inserts common
words into password fields to see if
one works.
INFECTING DEVICES WITH MALWARE

• malware, or malicious software, is any program or file that is


intentionally harmful to a computer, network or server
• hackers may infiltrate a user’s device to install malware
• target potential victims via email, instant messages and websites with
downloadable content or peer-to-peer networks
KEY DRIVERS WHICH LEAD TO HACKING

1) financial gain through the theft of credit card details


2) corporate espionage
3) to gain notoriety or respect for their hacking talents
4) state-sponsored hacking that aims to steal business
information and national intelligence
5) politically motivated hackers – hacktivists - who aim to raise
public attention by leaking sensitive information, such as
Anonymous, LulzSec, and WikiLeaks
TYPES OF HACKING
01 Black Hat Hackers – “The bad guys“
• inflict serious damage on both computer users and the organizations they work for, hey can
steal sensitive personal information, compromise computer and financial systems, and alter
or take down the functionality of websites and critical networks

02 White Hat Hackers – “The good guys“


• helps expose vulnerabilities in systems before black hat hackers can detect and
exploit them
• ethical hacking
06
03 Grey Hat Hackers
• between the good and the bad guys
• common good
What can be hacked?
WebCams
Smart devices

Email
Routers
PREVETION FROM GETTING
HACKED
1) SOFTWARE UPDATE
2) UNIQUE PASSWORDS

3) HTTPS ENCRYPTION - https://www.gymgolnr.sk/

4) INSTALL ANTIVIRUS SOFTWARE


5) USE A VPN - a virtual private network
6) Avoid clicking on ads or strange links
ETHICAL HACKING
• refers to the actions carried out by white hat security hackers
• involves gaining access to computer systems and networks to test for potential
vulnerabilities, and then fixing any identified weaknesses
• legal
• https://www.fortinet.com/resources/cyberglossary/what-is-hacking
• https://www.kaspersky.com/resource-center/definitions/what-is-hacking
• https://www.techtarget.com/searchsecurity/definition/malware
THANK YOU FOR
YOUR
ATTENTION

You might also like