Sie sind auf Seite 1von 10

SEKOLAH MENENGAH

LA SALLE
TANJUNG ARU
TITLE :

HACKING
Presented by : Mohd Danial Haiqal

WHAT IS HACKING?

HACKING, SPECIFICALLY COMPUTER


HACKING REFERS TO THE TECHNIQUE
OR PROCESS BY WHICH THE HACKER
GAINS ACCESS TO A COMPUTER
SYSTEM.
Presented by : Mohd Danial Haiqal

WHAT IS A HACKER?
HACKER IS A SLANG FOR A COMPUTER
ENTHUSIAST. A HACKER TARGETS OR FINDS OUT
THE LOOP HOLES IN THE COMPUTER SYSTEM AND
TRIES TO GAIN ACCESS OVER THE PARTICULAR
COMPUTER. THROUGH THE LOOP HOLES, A
HACKER IS ABLE TO EXPLOIT A WEAKNESS OR
VULNERABILITY IN A COMPUTER SYSTEM.
Presented by :

TYPES OF HACKING
A. INSIDE JOB
MOST SECURITY BREECHES ORIGINATE INSIDE THE NETWORK THAT IS UNDER ATTACK. INSIDE
JOBS INCLUDE STEALING PASSWORDS (WHICH HACKERS THEN USE OR SELL), PERFORMING
INDUSTRIAL ESPIONAGE, CAUSING HARM (AS DISGRUNTLED EMPLOYEES), OR COMMITING
SIMPLE MISUSE.
B. ROGUE ACCESS POINTS
ROGUE ACCESS POINTS (APS) ARE UNSECURED WIRELESS ACCESS POINTS THAT OUTSIDERS
CAN EASILY BREECH.(LOCAL HACKERS OFTEN ADVERTISE ROGUE APS TO EACH OTHER.)
C. BACK DOORS
HACKERS CAN GAIN ACCESS TO A NETWORK BY EXPLOITING BACK DOORS ADMINISTRATIVE
SHORTCUTS, CONFIGURATION ERRORS, EASILY DECIPHERED PASSWORDS, AND UNSECURED
DIAL-UPS.
Presented by : Mohd Danial Haiqal

D. VIRUSES AND WORMS


VIRUSES ARE SELF-REPLICATING PROGRAMS OR CODE FRAGMENTS THAT ATTACH
THEMSELVES TO OTHER PROGRAMS (VIRUSES) OR MACHINE (WORMS).
E. TROJAN HORSES
TROJAN HORSES, WHICH ARE ATTACHED TO OTHER PROGRAMS, ARE THE LEADING
CAUSE OF ALL BREAK-INS. WHEN A USER DOWNLOADS AND ACTIVATES A TROJAN
HORSE, THE HACKED SOFTWARE (SW) KICKS OFF A VIRUS, PASSWORD GOBBLER, OR
REMOTE-CONTROL SW THAT GIVES THE HACKER CONTROL OF THE PC.
F. DENIAL OF SERVICE(D.O.S)
D.O.S ATTACKS GIVE HACKERS A WAY TO BRING DOWN A NETWORK WITHOUT GAINING
INTERNAL ACCESS.
SNIFFING AND SPOOFING
SNIFFING REFERS TO THE ACT OF INTERCEPTING TCP PACKETS.
SPOOFING IS THE ACT OF SENDING AN ILLEGITIMATE PACKET WITH AN EXPECTED
Presented by : Mohd Danial Haiqal
ACKNOWLEDGEMENT (ACK).

TYPES OF HACKERS
1. LEGAL / ETHICAL HACKER
A. WHITE HAT
A WHITE HAT HACKER IS SOMEONE WHO HAS NON-MALICIOUS INTENT
WHENEVER HE BREAKS INTO SECURITY SYSTEMS AND WHATNOT. A WHITE
HAT THAT DOES VULNERABILITY ASSESSMENTS AND PENETRATION TESTS IS
ALSO KNOWN AS AN ETHICAL HACKER.

Presented by : Mohd Danial Haiqal

2. ILLEGAL / NON ETHICAL HACKER


A. BLACK HAT
A BLACK HAT HACKER, ALSO KNOWN AS A CRACKER, IS THE TYPE OF HACKER THAT HAS MALICIOUS
INTENT WHENEVER HE GOES ABOUT BREAKING INTO COMPUTER SECURITY SYSTEMS WITH THE USE
OF TECHNOLOGY SUCH AS A NETWORK, PHONE SYSTEM, OR COMPUTER AND WITHOUT
AUTHORIZATION.
B. GREY HAT
A GREY HAT HACKER IS SOMEONE WHO EXHIBITS TRAITS FROM BOTH WHITE HATS AND BLACK HATS.
C. ELITE HACKER
AS WITH ANY SOCIETY, BETTER THAN AVERAGE PEOPLE ARE REWARDED FOR THEIR TALENT AND
TREATED AS SPECIAL. THIS SOCIAL STATUS AMONG THE HACKER UNDERGROUND, THE ELITE.
D. SCRIPT KIDDIE
A SCRIPT KIDDIE IS BASICALLY AN AMATEUR OR NON-EXPERT HACKER WANNABE WHO BREAKS INTO
PEOPLES COMPUTER SYSTEMS NOT THROUGH HIS KNOWLEDGE IN IT SECURITY AND THE INS AND
OUTS OF A GIVEN WEBSITE, BUT THOUGH THE PRE-PACKAGED AUTOMATED SCRIPTS (HENCE THE
NAME), TOOLS, AND SOFTWARE WRITTEN BY PEOPLE WHO ARE REAL HACKERS, UNLIKE HIM.
Presented

by : Mohd Danial Haiqal

CONSEQUENCE OF HACKING
THOUSANDS OF DOLLARS IN
FINE.
.IMPRISONMENT.
.SEIZURE OF ONES COMPUTER.

Presented by : Mohd Danial Haiqal

CONCLUSION
PROPER ETHICAL HACKERS SHOULD BE EMPLOYED
.DO NOT EXPOSE YOUR PASSWORDS TO UNTRUSTED
SITES
.PRACTICE USING EXACT WEB ADDRESS
.CLOSE YOUR INTERNET WHILE NOT IN USE

Presented by : Mohd Danial Haiqal

REFERENCES :
1. HTTP://WWW.SLIDESHARE.NET
2. HTTP://WWW.TRIVOLOGY.COM
3. HTTP://WWW.WISEGEEK.ORG.HTM
4. HTTP://WWW.WEBOPEDIA.COM.HTML

Presented by : Mohd Danial Haiqal

Das könnte Ihnen auch gefallen