1 / 12

HACKING

LOCATE AND PRESENT INFORMATION ON IMPACT OF ICT ON SOCIETY. HACKING. NAME : FATINATUL NAZURAH BINTI ZAINUDDIN NO I/C : 950610-10-5862. CONTENT. TOPIC 1 CONTENT 2 INTRODUCTION 3 WHAT IS COMPUTER HACKING 4 HACKING SOFTWARE 5 ETHICAL HACKING 6

byron
Download Presentation

HACKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LOCATE AND PRESENT INFORMATION ON IMPACT OF ICT ON SOCIETY HACKING NAME : FATINATUL NAZURAH BINTI ZAINUDDIN NO I/C : 950610-10-5862

  2. CONTENT TOPIC 1 CONTENT 2 INTRODUCTION 3 WHAT IS COMPUTER HACKING 4 HACKING SOFTWARE 5 ETHICAL HACKING 6 EFFECTS OF COMPUTER HACKING 7 HACKING A COMPUTER 8 CONCLUSION 9 SOURCE OF REFERENCE 10

  3. INTRODUCTION • Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more difficult to define. • Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. • The impact of computer hacking varies from simply being simply invasive and annoying to illegal. • 1

  4. WHAT IS COMPUTER HACKING • Computerhacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. • People who engage in computer hacking activities are often called hackers. • 2

  5. HACKING SOFTWARE • Some computer hackers are so good they can crack very detailed codes and information on there own. • Most rely on various types of software though that install worms, Trojan horses, and viruses into systems. • They use these types of programs to help them gain access to the information they want. • It is scary to learn that there are so many different types of hacking software on the market. • 3

  6. ETHICAL HACKING • Ethical hacking is the process of trying to break down a system to identify its weaknesses. • That information is then used to continually build more advanced systems. • Many businesses and even the government are looking for people with such skills. • 4

  7. EFFECTS OF COMPUTER HACKING • Computer hacking is a breach of computer security. • It can expose sensitive user data and risk user privacy. • Hacking activities expose confidential user information like personal details, social security numbers, credit card numbers, bank account data and personal photographs. • 5

  8. HACKING A COMPUTER • Crackers transform computers into zombies by using small­ programs that exploit weaknesses in a computer's operating system (OS). • You might think that these crackers are cutting-edge Internet criminal masterminds, but in truth, many have little to no programming experience or knowledge. • 6

  9. CONCLUSION • The word "hacker" carries weight. • People strongly disagree as to what a hacker is. • Hacking may be defined as legal or illegal, ethical or unethical. • The conflict between discourses is important for our understanding of computer hacking subculture. • 7

  10. SOURCE OF REFERENCE wikipedia.org/wiki/Hacking_(computing) www.wisegeek.com/what-is-computer hacking.htm www.ethicalhacking.net/computer hacking

  11. GROUP MEMBERS • FATINATUL NAZURAH • NOOR INSYIRA • MARIAH IZZATI • NURUL FATIN NAJWA

  12. THE END

More Related