1 / 6

MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1. INTRODUCTION. As organizations are increasingly dependent on information technologies for sustainability and profitability, defending digital information assets against misuse or hacking has assumed vital importance. 1. Introduction

Download Presentation

MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

  2. INTRODUCTION • As organizations are increasingly dependent on information • technologies for sustainability and profitability, defending digital • information assets against misuse or hacking has assumed vital • importance. • 1. Introduction • As organizations are increasingly dependent on information • technologies for sustainability and profitability, defending digital • information assets against misuse or hacking has assumed vital • importance. • In essence, identity theft and financial fraud conducted by hackers have evolved into serious and pervasive threats to consumers and the financial services industry.

  3. What is Hacker?? • Hacking is the means of bypassing a security system for the means of accomplishing a task that is prohibited by the service or a machine. • Examples • Deleting someone else's Facebook/Twitter/Myspace account whereas the other person did not give any info away • Getting onto someone else xbox live account when the account info has been kept secret (this is only hacking, if they get into the system themselves such as Xbox.com Admin)

  4. Why would people want to hack? 1) it makes them feel clever and important 2) they can talk crap all they want as they will hack you if you talk 3) they can access anything, anybodys machine, popular services 4) everything is free 5) they can look tough over everyone, look hard

  5. What are the effects of computer hacking that's focused on obtaining data? • trade secrets may be compromised • personal details of individuals or customers, such as address information, social security numbers, bank account data, and credit card numbers may be used for identity theft, a $50 billion problem • keystroke loggers — software or sometimes hardware that records every key press on a computer's keyboard for the hacker to access — may reveal passwords and other important security information

More Related