muhamad syafiq bin borhanudin 2011194315 sr2211m1

6
MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

Upload: merrill-casey

Post on 31-Dec-2015

44 views

Category:

Documents


0 download

DESCRIPTION

MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1. INTRODUCTION. As organizations are increasingly dependent on information technologies for sustainability and profitability, defending digital information assets against misuse or hacking has assumed vital importance. 1. Introduction - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

MUHAMAD SYAFIQ BIN BORHANUDIN2011194315SR2211M1

Page 2: MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

1. Introduction

As organizations are increasingly dependent on information

technologies for sustainability and profitability, defending digital

information assets against misuse or hacking has assumed vital

importance.

As organizations are increasingly dependent on information

technologies for sustainability and profitability, defending digitalinformation assets against misuse or hacking has assumed vitalimportance.

INTRODUCTION

In essence, identity theft and financial fraud conducted by hackers have evolved into serious and pervasive threats to consumers and the financial services industry.

Page 3: MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

Getting onto someone else xbox live account when the account info has been kept secret (this is only hacking, if they get into the system themselves such as Xbox.com Admin)

What is Hacker??

Hacking is the means of bypassing a security system for the means of accomplishing a task that is prohibited by the service or a machine.

Examples

Deleting someone else's Facebook/Twitter/Myspace account whereas the other person did not give any info away

Page 4: MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

5) they can look tough over everyone, look hard

Why would people want to hack?

1) it makes them feel clever and important2) they can talk crap all they want as they will hack you if you talk3) they can access anything, anybodys machine, popular services4) everything is free

Page 5: MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1

keystroke loggers — software or sometimes hardware that records every key press on a computer's keyboard for the hacker to access — may reveal passwords and other important security information

What are the effects of computer hacking that's focused on obtaining data?

trade secrets may be compromised

personal details of individuals or customers, such as

address information, social security numbers, bank

account data, and credit card numbers may be used for

identity theft, a $50 billion problem

Page 6: MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1